Cisco IOS XR Getting Started Guide for the
Cisco XR 12000 Series Router
Cisco IOS XR Software Release 4.1
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-24755-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at
www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
Selecting and Identifying the Designated Shelf Controller1-9
Selecting and Identifying the DSC on Cisco XR 12000 and 12000 Series Routers1-9
Verifying the DSC1-9
Connecting to the Router Through the Console Port1-10
Where to Go Next1-16
Bringing Up the Cisco IOS XR Software on a Standalone Router2-17
Contents2-17
Prerequisites2-17
Software Requirements2-18
Hardware Prerequisites and Documentation2-18
Bringing Up and Configuring a Standalone Router2-19
Verifying the System After Initial Boot2-20
Where to Go Next2-25
Configuring General Router Features3-27
Contents3-27
Secure Domain Routers3-27
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
iii
Contents
Connecting and Communicating with the Router3-28
Establishing a Connection Through the Console Port3-32
Establishing a Connection Through a Terminal Server3-34
Establishing a Connection Through the Management Ethernet Interface3-36
Logging In to a Router or an SDR3-36
CLI Prompt3-37
User Access Privileges3-38
User Groups, Task Groups, and Task IDs3-39
Predefined User Groups3-40
Displaying the User Groups and Task IDs for Your User Account 3-41
Navigating the Cisco IOS XR Command Modes3-43
Identifying the Command Mode in the CLI Prompt3-44
Summary of Common Command Modes3-45
Entering EXEC Commands from a Configuration Mode3-47
Command Mode Navigation Example3-48
Managing Configuration Sessions3-49
Displaying the Active Configuration Sessions3-51
Starting a Configuration Session3-52
Starting an Exclusive Configuration Session3-53
Displaying Configuration Details with show Commands3-54
Saving the Target Configuration to a File3-60
Loading the Target Configuration from a File3-61
Loading an Alternative Configuration at System Startup3-61
Clearing All Changes to a Target Configuration3-61
Committing Changes to the Running Configuration3-62
Reloading a Failed Configuration3-64
Exiting a Configuration Submode3-64
Returning Directly to Configuration Mode from a Submode3-65
Ending a Configuration Session3-65
Aborting a Configuration Session3-65
Configuring the SDR Hostname3-66
Configuring the Management Ethernet Interface3-66
Specifying the Management Ethernet Interface Name in CLI Commands3-67
iv
Displaying the Available Management Ethernet Interfaces3-67
Configuring the Management Ethernet Interface3-68
Manually Setting the Router Clock3-72
Where to Go Next3-74
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Configuring Additional Router Features4-75
Contents4-75
Configuring the Domain Name and Domain Name Server 4-75
Configuring Telnet, HTTP, and XML Host Services4-77
Prerequisites4-77
Managing Configuration History and Rollback4-81
Displaying the Commit IDs4-82
Displaying the Configuration Changes Recorded in a Commit ID4-82
Previewing Rollback Configuration Changes4-83
Rolling Back the Configuration to a Specific Rollback Point4-83
Rolling Back the Configuration over a Specified Number of Commits4-84
Loading Commit ID Configuration Changes to the Target Configuration 4-84
Loading Rollback Configuration Changes to the Target Configuration4-85
Deleting Commit IDs4-86
Creating and Modifying User Accounts and User Groups4-90
Displaying Details About User Accounts, User Groups, and Task IDs4-91
CLI Tips, Techniques, and Shortcuts5-93
Contents5-93
CLI Tips and Shortcuts5-93
Entering Abbreviated Commands5-93
Using the Question Mark (?) to Display On-Screen Command Help 5-94
Completing a Partial Command with the Tab Key5-96
Identifying Command Syntax Errors 5-96
Using the no Form of a Command5-97
Editing Command Lines that Wrap5-97
Displaying System Information with show Commands5-98
Common show Commands5-98
Browsing Display Output When the --More-- Prompt Appears5-99
Halting the Display of Screen Output5-100
Redirecting Output to a File5-100
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
v
Contents
Narrowing Output from Large Configurations5-100
Filtering show Command Output5-102
show parser dump command5-105
Accessing Admin Commands from Secure Domain Router Mode5-105
Location Keyword for the File Command5-105
vty / Console Timestamp5-106
Displaying Interfaces by Slot Order5-106
Displaying Unconfigured Interfaces5-107
Displaying Subnet Mask in CIDR Format5-108
Wildcards, Templates, and Aliases5-109
Using Wildcards to Identify Interfaces in show Commands5-109
Creating Configuration Templates5-110
Applying Configuration Templates5-112
Aliases5-113
Keystrokes Used as Command Aliases5-114
Key Combinations to Move the Cursor5-116
Keystrokes to Control Capitalization5-117
Keystrokes to Delete CLI Entries5-118
Transposing Mistyped Characters5-118
Troubleshooting the Cisco IOS XR Software6-119
Contents6-119
Additional Sources of Information6-119
Basic Troubleshooting Commands6-119
Using show Commands to Display System Status and Configuration6-120
Using the ping Command6-121
Using the traceroute Command6-122
Using debug Commands6-123
vi
Configuration Error Messages6-127
Configuration Failures During a Commit Operation6-127
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Configuration Errors at Startup6-127
Memory Warnings in Configuration Sessions6-128
Understanding Low-Memory Warnings in Configuration Sessions6-128
Displaying System Memory Information6-129
Removing Configurations to Resolve Low-Memory Warnings6-130
Contacting TAC for Additional Assistance6-132
Interfaces Not Coming Up6-132
Verifying the System Interfaces6-132
Understanding Regular Expressions, Special Characters, and PatternsA-137
ContentsA-137
Regular Expressions A-137
Special CharactersA-138
Character Pattern RangesA-138
Multiple-Character PatternsA-139
Contents
G
LOSSARY
I
NDEX
Complex Regular Expressions Using MultipliersA-139
Pattern AlternationA-140
Anchor CharactersA-140
Underscore WildcardA-140
Parentheses Used for Pattern RecallA-141
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
vii
Contents
viii
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Preface
This guide describes how to create the initial configuration for a router using the
Cisco IOS XR software. This guide also describes how to complete additional administration,
maintenance, and troubleshooting tasks that may be required after initial configuration.
This preface contains the following sections:
• Changes to This Document, page ix
• About This Document, page ix
• Obtaining Documentation and Submitting a Service Request, page xi
Changes to This Document
Tabl e 1 lists the technical changes made to this document since it was first printed.
Table 1Changes to This Document
RevisionDateChange Summary
OL-24755-01April 2011Initial release of this document.
About This Document
The following sections provide information about Cisco IOS XR Getting Started Guide for the Cisco XR
12000 Series Router and related documents:
• Intended Audience, page x
• Organization of the Document, page x
• Related Documents, page x
• Conventions, page xi
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
ix
Intended Audience
This document is intended for the following people:
• Experienced service provider administrators
• Cisco telecommunications management engineers
• Third-party field service technicians who have completed the Cisco IOS XR software training
sessions
• Customers who daily use and manage routers running Cisco IOS XR software
Organization of the Document
This document contains the following chapters:
• Introduction to Cisco IOS XR Software
• Bringing Up the Cisco IOS XR Software on a Standalone Router
• Configuring General Router Features
• Configuring Additional Router Features
• CLI Tips, Techniques, and Shortcuts
Preface
• Troubleshooting the Cisco IOS XR Software
• Understanding Regular Expressions, Special Characters, and Patterns
Related Documents
For a complete listing of available documentation for the Cisco IOS XR software and the routers on
which it operates, see the following URLs:
NoteCisco IOS XR software runs only on the Cisco XR 12000 Series Routers listed in the “Supported
Standalone System Configurations” section on page 1-1.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
x
OL-24755-01
Preface
Conventions
This document uses the following conventions:
ConventionItem
boldface fontCommands and keywords
italic fontVariable for which you supply values
screen fontDisplayed session and system information
boldface screen fontCommands and keywords you enter in an
interactive environment
italic screen fontVariables you enter in an interactive environment
boldface fontMenu items and button names
Option > Network PreferencesMenu navigation
NoteMeans reader take note. Notes contain helpful suggestions or references to material not covered in the
publication.
TipMeans the following information will help you solve a problem. The information in tips might not be
troubleshooting or an action, but contains useful information.
CautionMeans reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional
information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and
revised Cisco technical documentation, at:
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
xi
Preface
xii
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Contents
CHAPTER
1
Introduction to Cisco IOS XR Software
This chapter introduces the routers that support Cisco IOS XR software. It also introduces router
concepts, features, and user interfaces.
• Supported Standalone System Configurations, page 1-1
• Cisco XR 12000 Series Router Overview, page 1-2
• Router Management Interfaces, page 1-7
• Selecting and Identifying the Designated Shelf Controller, page 1-9
• Connecting to the Router Through the Console Port, page 1-10
• Where to Go Next, page 1-16
Supported Standalone System Configurations
The Cisco IOS XR software runs on the following standalone systems:
• Cisco XR 12006 Router
• Cisco XR 12008 Router
• Cisco XR 12010 Router
• Cisco XR 12012 Router
• Cisco XR 12016 Router
• Cisco XR 12404 Router
• Cisco XR 12406 Router
• Cisco XR 12410 Router
• Cisco XR 12416 Router
NoteMany cards operate in both Cisco XR 12000 Series Routers and in Cisco 12000 Series Internal Routers.
For the latest information on which cards are supported by the Cisco IOS XR software in
Cisco XR 12000 Series Routers and Cisco 12000 Series Internal Routers, see Release Notes for
Command Cisco IOS XR Software Release 4.0.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
1-1
Cisco XR 12000 Series Router Overview
Cisco XR 12000 Series Router Overview
The Cisco XR 12000 Series Router is powered by Cisco IOS XR software, allowing service providers to
isolate public and private services through the virtualization of a single router into separate physical and
logical partitions. Cisco IOS XR software is a unique self-healing and self-defending operating system
designed for always-on operation while scaling capacity and adding new services or features. With
distributed processing intelligence and robust quality-of-service (QoS) and multicast mechanisms, the
Cisco XR 12000 Series Router allows providers to scale services and customers with performance.
Features and Capabilities
The router is a scalable carrier-class distributed forwarding router, which is designed for redundancy,
high security and availability, packaging, power, and other requirements needed by service providers.
The router aggregates triple play Multi-service edge and Ethernet service traffic aggregating these
services to 10 Gigabit Ethernet IP, MPLS edge, or core. It support Ethernet, serial (including MLPPP),
frame relay and POS interface on the access side and Ethernet or POS interfaces on the core side.
The following sections describe the features and capabilities in detail:
Chapter 1 Introduction to Cisco IOS XR Software
• Cisco IOS XR Software, page 1-2
• Flexible Ethernet, page 1-4
• L2VPN, page 1-4
• Multicast, page 1-5
• OAM, page 1-5
• Layer 3 Routing, page 1-5
• MPLS VPN, page 1-6
• QoS, page 1-6
• MPLS TE, page 1-7
Cisco IOS XR Software
The router runs Cisco IOS XR Software, which offers the following:
• Rich Networking Feature Set—Cisco IOS XR Software represents a continuation of the Cisco
networking leadership in helping customers realize the power of their networks and the Internet. It
provides unprecedented routing-system scalability, high availability, service isolation, and
manageability to meet the mission-critical requirements of next-generation networks.
• Operating system infrastructure protection—Cisco IOS XR Software provides a microkernel
architecture that forces all but the most critical functions, such as memory management and thread
distribution, outside of the kernel, thereby preventing failures in applications, file systems, and even
device drivers from causing widespread service disruption.
• Process and thread protection—Each process, even individual process thread, is executed in its own
protected memory space, and communications between processes are accomplished through
well-defined, secure, and version-controlled application programming interfaces (APIs),
significantly minimizing the effect that any process failure can have on other processes.
1-2
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
availability during installation of a software upgrade. ISSUs or hitless software upgrades (HSUs)
allow you to upgrade most Cisco router software features without affecting deployed services. You
can target particular system components for upgrades based on software packages or composites that
group selected features. Cisco preconfigures and tests these packages and composites to help ensure
system compatibility.
• Process restart—You can restart critical control-plane processes both manually and automatically in
response to a process failure versus restarting the entire operating system. This feature supports the
Cisco IOS XR Software goal of continuous system availability and allows for quick recovery from
process or protocol failures with minimal disruption to customers or traffic.
• State checkpoint—You can maintain a memory and critical operating state across process restarts to
sustain routing adjacencies and signaling state during a Route Switch Processor (RSP) switchover.
• Ethernet virtual connections (EVCs)—Ethernet services are supported using individual EVCs to
carry traffic belonging to a specific service type or end user through the network. You can use
EVC-based services in conjunction with MPLS-based L2VPNs and native IEEE bridging
deployments.
• Flexible VLAN classification—VLAN classification into Ethernet flow points (EFPs) includes
single-tagged VLANs, double-tagged VLANs (QinQ and IEEE 802.1ad), contiguous VLAN ranges,
and noncontiguous VLAN lists.
Cisco XR 12000 Series Router Overview
• IEEE Bridging—Software supports native bridging based on IEEE 802.1Q, IEEE 802.1ad, IEEE
802.1ah provider backbone bridges (PBB) and QinQ VLAN encapsulation mechanisms on the
router.
• IEEE 802.1s Multiple Spanning Tree (MST)—MST extends the IEEE 802.1w Rapid Spanning Tree
Protocol (MSTP) to multiple spanning trees, providing rapid convergence and load balancing.
• MST Access Gateway—This feature provides a resilient, fast-convergence mechanism for
aggregating and connecting to Ethernet-based access rings.
• Virtual Private LAN Services (VPLS)—VPLS is a class of VPN that supports the connection of
multiple sites in a single, bridged domain over a managed IP/MPLS network. It presents an Ethernet
interface to customers, simplifying the LAN and WAN boundary for service providers and
customers, and enabling rapid and flexible service provisioning because the service bandwidth is
not tied to the physical interface. All services in a VPLS appear to be on the same LAN, regardless
of location.
• Hierarchical VPLS (H-VPLS)—H-VPLS provides a level of hierarchy at the edge of the VPLS
network for increased scale. QinQ access and H-VPLS pseudowire access options are supported.
• Virtual Private WAN Services/Ethernet over MPLS (VPWS/EoMPLS)—EoMPLS transports
Ethernet frames across an MPLS core using pseudowires. Individual EFPs or an entire port can be
transported over the MPLS backbone using pseudowires to an egress interface or subinterface.
• Pseudowire redundancy—Pseudowire redundancy supports the definition of a backup pseudowire to
protect a primary pseudowire that fails.
• Multisegment pseudowire stitching—Multisegment pseudowire stitching is a method for
interworking two pseudowires together to form a cross-connect relationship.
OL-24755-01
• IPv4 Multicast—IPv4 Multicast supports Internet Group Management Protocol Versions 2 and 3
(IGMPv2/v3), Protocol Independent Multicast Source Specific Multicast (SSM) and Sparse Mode
(SM), Multicast Source Discovery Protocol (MSDP), and Anycast Rendezvous Point (RP).
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-3
Cisco XR 12000 Series Router Overview
• IGMP v2/v3 Snooping—This Layer 2 mechanism efficiently tracks multicast membership on an
• N-Tuple Hashing—A new 7-tuple hash algorithm, which provides better load balancing across equal
• Link Bundling Phase 3—The link bundle interface is enabled to be used as an edge-facing interface
Flexible Ethernet
The router uses Ethernet as its transport mechanism, which offers the following:
• Ethernet virtual connections (EVCs)—Ethernet services are supported using individual EVCs to
Chapter 1 Introduction to Cisco IOS XR Software
L2VPN network. Individual IGMP joins are snooped at the VLAN level or pseudowire level, and
then it summarizes the results into a single upstream join message. In residential broadband
deployments, this feature enables the network to send only channels that are being watched to the
downstream users.
cost paths, is introduced. This algorithm uses additional Layer 4 information from the Layer 3
packet. For more information on 7-tuple hashing, see the Cisco IOS XR IP Addresses and Services Configuration Guide for the Cisco XR 12000 Series Router.
by providing a number of new features, such as ACL, Mac Accounting, IPv6, PIMv6, uRPF, MVPN,
L2VPN, BFD, and Unequal BW. For more information on link bundling phase 3, see the Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco XR 12000 Series Router.
carry traffic belonging to a specific service type or end user through the network. You can use
EVC-based services in conjunction with MPLS-based L2VPNs and native IEEE bridging
deployments.
L2VPN
• Flexible VLAN classification—VLAN classification into EFPs includes single-tagged VLANs,
double-tagged VLANs (QinQ and IEEE 802.1ad), contiguous VLAN ranges, and noncontiguous
VLAN lists.
• IEEE Bridging— The software supports native bridging based on IEEE 802.1Q, IEEE 802.1ad, and
QinQ VLAN encapsulation mechanisms on the router.
• IEEE 802.1s Multiple Spanning Tree (MST)—MST extends the MSTP to multiple spanning trees,
providing rapid convergence and load balancing.
• MST Access Gateway—This feature provides a resilient, fast-convergence mechanism for
aggregating and connecting to Ethernet-based access rings.
The router uses L2VPNs, which offers the following:
• Virtual Private LAN Services (VPLS)—VPLS is a class of VPN that supports the connection of
multiple sites in a single, bridged domain over a managed IP/MPLS network. It presents an Ethernet
interface to customers, simplifying the LAN and WAN boundary for service providers and
customers, and enabling rapid and flexible service provisioning because the service bandwidth is
not tied to the physical interface. All services in a VPLS appear to be on the same LAN, regardless
of location.
• Hierarchical VPLS (H-VPLS)—H-VPLS provides a level of hierarchy at the edge of the VPLS
network for increased scale. QinQ access and H-VPLS pseudowire access options are supported.
• Virtual Private WAN Services/Ethernet over MPLS (VPWS/EoMPLS)—EoMPLS transports
Ethernet frames across an MPLS core using pseudowires. Individual EFPs or an entire port can be
transported over the MPLS backbone using pseudowires to an egress interface or subinterface.
1-4
• Pseudowire redundancy—Pseudowire redundancy supports the definition of a backup pseudowire to
protect a primary pseudowire that fails.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 1 Introduction to Cisco IOS XR Software
• Multisegment pseudowire stitching—This feature is a method used to interwork two pseudowires
together to form a cross-connect relationship.
Multicast
The router supports multicast, which offers the following:
• IPv4 Multicast—IPv4 Multicast supports Internet Group Management Protocol Versions 2 and 3
(IGMPv2/v3), Protocol Independent Multicast Source Specific Multicast (SSM) and Sparse Mode
(SM), Multicast Source Discovery Protocol (MSDP), and Anycast Rendezvous Point (RP).
• IGMP v2/v3 Snooping—This Layer 2 mechanism efficiently tracks multicast membership on an
L2VPN network. Individual IGMP joins are snooped at the VLAN level or pseudowire level, and
then it summarizes the results into a single upstream join message. In residential broadband
deployments, this feature enables the network to send only channels that are being watched to the
downstream users.
OAM
The router supports different types of operations, administration, and maintenance (OAM), which offers
the following:
Cisco XR 12000 Series Router Overview
Layer 3 Routing
• E-OAM (IEEE 802.3ah)—Ethernet link layer OAM is a vital component of EOAM that provides
physical-link OAM to monitor link health and assist in fault isolation. Along with IEEE 802.1ag,
Ethernet link layer OAM can be used to assist in rapid link-failure detection and signaling to remote
end nodes of a local failure.
• E-OAM (IEEE 802.1ag and ITU-T Y.1731)—Ethernet Connectivity Fault Management (CFM) is a
service-level OAM protocol that provides a number of mechanisms for fault management and
performance monitoring. This includes procedures for monitoring and verifying the path between
multiple end points, via IEEE 802.1 bridges and LANs.
interface for performance monitoring, using the capabilities provided by the Ethernet CFM.
• Ethernet Fault Detection—The router supports a mechanism to use faults detected by Ethernet OAM
protocols as a trigger to bring down interfaces or sub-interfaces. Hence, there is a trigger protection
switching or L3 re-routing during a failure.
The router runs Cisco IOS XR Software, which supports Layer 3 routing and a range of IPv4 services
and routing protocols, including the following:
• Intermediate System-to-Intermediate System (IS-IS)—Integrated Intermediate IS-IS, Internet
Protocol Version 4 (IPv4), is a standards-based Interior Gateway Protocol (IGP). For more
information on IS-IS, see Cisco IOS XR Routing Configuration Guide for the Cisco XR 12000 Series Router.
• Open Shortest Path First (OSPF)—OSPF is an IGP developed by the OSPF working group of the
Internet Engineering Task Force (IETF). For more information on OSPF, see Cisco IOS XR Routing
Configuration Guide for the Cisco XR 12000 Series Router.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-5
Cisco XR 12000 Series Router Overview
• Static Routing—Static routes are user-defined routes that cause packets moving between a source
and a destination to take a specified path. For more information on static routing, see Cisco IOS XR
Routing Configuration Guide for the Cisco XR 12000 Series Router.
• IPv4 Multicast—IPv4 Multicast delivers source traffic to multiple receivers without adding any
additional burden on the source or the receivers while using the least network bandwidth of any
competing technology. For more information on IPv4 Multicast, see Cisco IOS XR Multicast Configuration Guide for the Cisco XR 12000 Series Router.
• Routing Policy Language (RPL)—RPL provides a single, straightforward language in which all
routing policy needs can be expressed. For more information on RPL, see Cisco IOS XR Routing
Configuration Guide for the Cisco XR 12000 Series Router.
• Hot Standby Router Protocol (HSRP)—HSRP is an IP routing redundancy protocol designed to
allow for transparent failover at the first-hop IP router. For more information on HSRP, see Cisco
IOS XR IP Addresses and Services Configuration Guide for the Cisco XR 12000 Series Router.
• Virtual Router Redundancy Protocol (VRRP)—VRRP allows for transparent failover at the first-hop
IP router, enabling a group of routers to form a single virtual router. For more information on VRRP,
see Cisco IOS XR IP Addresses and Services Configuration Guide for the Cisco XR 12000 Series Router.
• Border Gateway Protocol (BGP) Add Path— This feature enables a BGP speaker to send multiple
paths for a prefix. For more information on BGP Add Path, see Cisco IOS XR Routing Configuration
Guide for the Cisco XR 12000 Series Router.
• Selective VRF Download (SVD)—This feature allows the download of only those prefixes and
labels to a line card that are actively required to forward traffic through that line card. For more
information on SVD, see the Cisco IOS XR Routing Configuration Guide for the Cisco XR 12000 Series Router.
Chapter 1 Introduction to Cisco IOS XR Software
MPLS VPN
QoS
The router supports MPLS VPN, which offers the following:
• MPLS L3VPN—This IP VPN feature for MPLS allows a Cisco IOS Software or
Cisco IOS XR software network to deploy scalable IPv4 Layer 3 VPN backbone services. An IP
VPN is the foundation that companies use for deploying or administering value-added services,
including applications and data hosting network commerce and telephony services, to business
customers.
• Carrier Supporting Carrier (CSC)—CSC allows an MPLS VPN service provider to connect
geographically isolated sites using another backbone service provider and still maintain a private
address space for its customer VPNs. It is implemented as defined by IETF RFC 4364.
• Inter-AS—is a peer-to-peer type model that allows extension of VPNs through multiple provider or
multi-domain networks. This lets service providers peer up with one another to offer end-to-end
VPN connectivity over extended geographical locations. An MPLS VPN Inter-AS allows:
–
VPN to cross more than one service provider backbone.
–
VPN to exist in different areas.
–
Confederations to optimize Internal Border Gateway Protocol (iBGP) meshing.
The router supports many types of quality of service (QoS), which offers the following:
1-6
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 1 Introduction to Cisco IOS XR Software
• QoS—Comprehensive QoS support with up to 3 million queues, Class-Based Weighted Fair
Queuing (CBWFQ) based on a three-parameter scheduler, Weighted Random Early Detection
(WRED), two-level strict priority scheduling with priority propagation, and 2-rate, 3-color (2R3C)
Policing are all supported.
• Cisco IOS XR Software—This software supports a rich variety of QoS mechanisms, including
policing, marking, queuing, dropping, and shaping. In addition, the operating systems support
Modular QoS CLI (MQC). Modular CLI is used to configure various QoS features on various Cisco
platforms.
• H-QoS—Is supported on Ethernet interfaces. For EVCs four-level H-QoS support is provided with
the following hierarchy levels: port, group of EFPs, EFP, and class of service. This level of support
allows for per-service and per-end user QoS granularity. Four-level H-QoS support is provided for
EVCs with the following hierarchy levels: port, group of EFPs, EFP, and class of service. This level
of support allows for per-service and per-end user QoS granularity. H-QOS support is also provided
on SIP based interfaces.
MPLS TE
The router supports MPLE Traffic Engineering (TE), which offers the following:
• MPLS TE—Cisco IOS XR Software supports MPLS protocols such as Traffic Engineering/Fast
Reroute (TE-FRR), Resource Reservation Protocol (RSVP), Label Distribution Protocol (LDP), and
Targeted Label Distribution Protocol (T-LDP).
Router Management Interfaces
• MPLS TE Preferred Path—Preferred tunnel path functions let you map pseudowires to specific TE
tunnels. Attachment circuits are cross-connected to specific MPLS TE tunnel interfaces instead of
remote provider-edge router IP addresses (reachable using IGP or LDP).
• Ignore Intermediate System-to-Intermediate System (IS-IS) Overload Bit Avoidance—This feature
allows network administrators to prevent a RSVP-TE Label Switched Path (LSP) from being
disabled when a router in that path has its Intermediate System-to-Intermediate System (IS-IS)
overload bit set. For more information on IS-IS overload bit aviodance, see the Cisco IOS XR MPLS Configuration Guide for the Cisco XR 12000 Series Router.
Router Management Interfaces
Because new routers are not yet configured for your environment, you must begin the configuration
using the command-line interface (CLI). This guide provides instructions on using the CLI to configure
basic router features. Cisco IOS XR software supports the following router management interfaces,
which are described in the following sections:
• Command-Line Interface, page 1-7
• Extensible Markup Language API, page 1-8
• Simple Network Management Protocol, page 1-8
Command-Line Interface
OL-24755-01
The CLI is the primary user interface for configuring, monitoring, and maintaining routers that run
Cisco IOS XR software. The CLI allows you to directly and simply execute Cisco IOS XR commands.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-7
Router Management Interfaces
All procedures in this guide use CLI. Before you can use other router management interfaces, you must
first use the CLI to install and configure those interfaces. Guidelines for using the CLI to configure the
router are discussed in the following chapters:
• Configuring General Router Features
• Configuring Additional Router Features
• CLI Tips, Techniques, and Shortcuts
For more information on CLI procedures for other tasks, such as hardware interface and software
protocol management tasks, see the Cisco IOS XR software documents listed in the “Related
Documents” section on page x.
Extensible Markup Language API
The Extensible Markup Language (XML) application programming interface (API) is an XML interface
used for rapid development of client applications and perl scripts to manage and monitor the router.
Client applications can be used to configure the router or request status information from the router by
encoding a request in XML API tags and sending it to the router. The router processes the request and
sends the response to the client in the form of encoded XML API tags. The XML API supports readily
available transport layers, including Telnet, SSH, and Common Object Request Broker Architecture
(CORBA). The Secure Socket Layer (SSL) transport is also supported by the XML API.
Chapter 1 Introduction to Cisco IOS XR Software
For more information, see the Cisco IOS XR software documents listed in the “Related Documents”
section on page x.
Simple Network Management Protocol
Simple Network Management Protocol (SNMP) is an application-layer protocol that facilitates the
exchange of management information between network devices. By using SNMP-transported data (such
as packets per second and network error rates), network administrators can manage network
performance, find and solve network problems, and plan for network growth.
The Cisco IOS XR software supports SNMP v1, v2c, and v3. SNMP is part of a larger architecture called
the Internet Network Management Framework (NMF), which is defined in Internet documents called
RFCs. The SNMPv1 NMF is defined by RFCs 1155, 1157, and 1212, and the SNMPv2 NMF is defined
by RFCs 1441 through 1452..
SNMP is a popular protocol for managing diverse commercial internetworks and those used in
universities and research organizations. SNMP-related standardization activity continues even as
vendors develop and release state-of-the-art, SNMP-based management applications. SNMP is a
relatively simple protocol, yet its feature set is sufficiently powerful to handle the difficult problems
presented in trying to manage the heterogeneous networks of today.
For more information, see the Cisco IOS XR software documents listed in the “Related Documents”
section on page x.
1-8
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 1 Introduction to Cisco IOS XR Software
Selecting and Identifying the Designated Shelf Controller
Selecting and Identifying the Designated Shelf Controller
The designated shelf controller (DSC) controls a standalone router or a multishelf system. A DSC is a
role that is assigned to one performance route processor (PRP) card in each router . A DSC is a role that
is assigned to one performance route processor (PRP) card in each router or multishelf system. PRP
cards operate in Cisco XR 12000 and 12000 Series Routers.
NoteThroughout this guide, the term PRP is used to refer to the PRP cards supported on
Cisco XR 12000 Series Routers. Cisco XR 12000 Series Routers, support both the PRP-2 and the
PRP-3 cards. If a feature or an issue applies to only one platform, the accompanying text specifies the
platform.
Although each router can have two RP cards, only one can serve as the DSC and control the router. The
DSC provides system-wide administrative functions, including:
• User configuration using a terminal connection or network connection
• Distribution of software to each node in the router or system
• Coordination of software versioning and configurations for all nodes in the router or system
• Hardware inventory and environmental monitoring
The first step in setting up a new router is to select or identify the DSC because the initial router
configuration takes place through the DSC. The following sections describe how to select and identify
the DSC on different routers:
• Selecting and Identifying the DSC on Cisco XR 12000 and 12000 Series Routers, page 1-9
• Verifying the DSC, page 1-9
Selecting and Identifying the DSC on Cisco XR 12000 and 12000 Series Routers
A Cisco XR 12000 Series Router or Cisco 12000 Series Internal Router supports multiple PRPs. When
the router is started for the first time, the PRP in the slot with the lowest number becomes the active PRP
and is identified by the alphanumeric display: ACTV RP. The active PRP serves as the DSC. If another
PRP is configured as a standby PRP for the DSC, that PRP can assume the DSC role if the DSC fails.
To have a PRP in a higher-numbered slot become the DSC, you must bring up the router with only that
PRP installed. After the chosen PRP becomes the DSC, it remains the DSC after subsequent restarts and
you can add the other PRPs.
NoteAdditional PRPs can be installed to host secure domain routers (SDRs), which are introduced in
Chapter 3, “Configuring General Router Features.” To configure general router features, you must
connect to the DSC. To configure SDR features, you must connect to the PRP for the appropriate SDR.
Verifying the DSC
Use the show dsc command to verify which RP is acting as the primary DSC for the router or routing
system.
The following example shows sample output of the show dsc command on a
Cisco XR 12000 Series Router:
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-9
Chapter 1 Introduction to Cisco IOS XR Software
Connecting to the Router Through the Console Port
RP/0/0/CPU0:router#admin
Mon May 31 01:38:09.733 DST
RP/0/0/CPU0:router(admin)#show dsc all
Mon May 31 01:38:31.134 DST
NODE ROLE PRIORITY TBEACON PRESENT SERIAL ID
============================================================================
0/0/CPU0 DSC 3 2000 YES invalid
The first time you connect to a new router with Cisco IOS XR software, you must connect through the
Console port on the DSC. Although typical router configuration and management take place using an
Ethernet port on the DSC, you must configure the console port for your LAN before it can be used.
1-10
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 1 Introduction to Cisco IOS XR Software
Figure 1-1 shows the PRP-2 connections on the Cisco XR 12000 Series Router. Figure 1-2 shows the
PRP-3 connections on the Cisco XR 12000 Series Router.
NoteCisco IOS XR software does not support PRP-1.
Connecting to the Router Through the Console Port
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-11
Chapter 1 Introduction to Cisco IOS XR Software
ACT
SIG
ACT
SIG
SLOT-1
SLOT-0
CONSOLEETH 2AUX
RESET
PERFORMANCE ROUTE PROCESSOR 2
BITS 1BITS 0
DATA
LINK
DATA
LINK
ETH 1ETH 0
149695
Terminal connection
Modem connection
User-removable flash disk1
stores installation PIE files
A second internal flash disk0
stores installed software and
active configurations
LED status
displays
(alphanumeric)
Remote CLI, CWI, XML,
or SNMP communication.
Remote file storage
Ethernet cable
Network
Local terminal or
terminal server for
CLI communication
RJ-45 cable
Remote terminal for
CLI communication
RJ-45 cable
Management Ethernet connection for
out-of-band network communication
Connecting to the Router Through the Console Port
Figure 1-1Communication Ports on the PRP-2 for a Cisco XR 12000 Series Router
1-12
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 1 Introduction to Cisco IOS XR Software
272359
CONSOLE
AUXBITS 1BITS 0ETH 1ETH 0
PERFORMANCE RP 3
RESET
AC
T
S
I
G
AC
T
S
I
G
D
A
T
A
L
IN
K
D
A
TA
L
INK
13452
Figure 1-2Communication Ports on the PRP-3
1Ejector Lever
2Handle
3External Compact Flash
4Reset button
5 Alphanumeric LEDs
Connecting to the Router Through the Console Port
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-13
Connecting to the Router Through the Console Port
To connect to the router through the Console port, perform the following procedure.
SUMMARY STEPS
1. Power on the standalone router, or power on Rack 0 in a multishelf system.
2. Identify the DSC.
3. Connect a terminal to the Console port of the DSC.
4. Start the terminal emulation program.
5. Press Enter.
6. Log in to the router.
7. admin
8. show dsc all
DETAILED STEPS
Command or ActionPurpose
Step 1
Power on the standalone router, or power on Rack 0 in
a multishelf system.
Step 2
Step 3
Identify the DSC.Identifies the RP to which you must connect in the next step.
Connect a terminal to the Console port of the DSC.Establishes a communications path to the router.
Chapter 1 Introduction to Cisco IOS XR Software
Starts the router or Rack 0.
• This step is required only if the power is not on.
• For information on power installation and controls, see
the hardware documentation listed in the “Related
Documents” section on page x.
• For more information, see the “Selecting and
Identifying the Designated Shelf Controller” section on
page 1-9.
1-14
• During the initial setup, you can communicate with the
• Router Console port is designed for a serial cable
• Terminal settings are:
• For information on the cable requirements for the
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
router only through the Console port of the DSC.
connection to a terminal or a computer that is running a
terminal emulation program.
–
Bits per second: 9600/9600
–
Data bits: 8
–
Parity: None
–
Stop bit: 2
–
Flow control: None
Console port, see the hardware documentation listed in
the “Related Documents” section on page x.
OL-24755-01
Chapter 1 Introduction to Cisco IOS XR Software
Command or ActionPurpose
Step 4
Step 5
Start the terminal emulation program.(Optional) Prepares a computer for router communications.
Press Enter.Initiates communication with the router.
Connecting to the Router Through the Console Port
• Not required if you are connecting through a terminal.
• Terminals send keystrokes to, and receive characters,
from another device. If you connect a computer to the
Console port, you must use a terminal emulation
program to communicate with the router. For
instructions on using the terminal emulation program,
see the documentation for that program.
• If no text or router prompt appears when you connect to
the console port, press Enter to initiate
communications.
• If no text appears when you press Enter, give the router
more time to complete the initial boot procedure, then
press Enter.
• If the prompt gets lost among display messages, press
Enter again.
Step 6
Step 7
Step 8
• If the router has no configuration, the router displays
the prompt:
• If the router has been configured, the router displays the
prompt:
Enter root-system username:
Username:
Log in to the router.Establishes your access rights for the router management
session.
• Enter the root-system username and password or the
username and password provided by your system
administrator.
• After you log in, the router displays the CLI prompt,
which is described in the “CLI Prompt” section on
page 3-37.
• If the router prompts you to enter a root-system
username, the router is not configured, and you should
follow one of the bring up procedures mentioned in the
next section.
admin
Places the router in administration EXEC mode.
Example:
RP/0/0/CPU0:router# admin
show dsc all
Displays the DSC information for the router or router
system so that you can verify that you have connected to the
Example:
RP/0/0/CPU0:router(admin)# show dsc all
DSC console port.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-15
Where to Go Next
Where to Go Next
If you have logged into the router or multishelf system, you can perform the general router configuration
as described in Configuring General Router Features.
If the router is prompting you to enter a root-system username, bring up the router. For more information,
see Bringing Up the Cisco IOS XR Software on a Standalone Router.
Chapter 1 Introduction to Cisco IOS XR Software
1-16
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
NoteIf you are upgrading a Cisco XR 12000 Series Router from Cisco IOS software to
Contents
CHAPTER
2
Bringing Up the Cisco IOS XR Software on a
Standalone Router
This chapter provides instructions for bringing up the Cisco IOS XR software on a standalone router for
the first time. This section applies to standalone routers that are delivered with Cisco IOS XR software
installed.
Cisco IOS XR software, see the Cisco IOS XR software document Upgrading from Cisco IOS to Cisco IOS XR Software on the Cisco 12000 Series Router.
• Prerequisites, page 2-17
• Bringing Up and Configuring a Standalone Router, page 2-19
• Verifying the System After Initial Boot, page 2-20
• Where to Go Next, page 2-25
Prerequisites
The following sections describe the software and hardware requirements for bringing up a standalone
system running Cisco IOS XR Software Release 4.1.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
2-17
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
Prerequisites
Software Requirements
The system requires compatible ROM Monitor firmware on all RPs.
CautionThe ROM Monitor firmware on all RPs must be compatible with the Cisco IOS XR software release
currently running on the router before a Cisco XR 12000 Series Router system is upgraded to Cisco IOS
XR Software Release 4.1. For minimum ROM Monitor requirements for Cisco IOS XR Software Release
3.2.0 and later releases, see the Software/Firmware Compatibility Matrix at the following URL:
If the router is brought up with an incompatible version of the ROM Monitor software, the standby RP
may fail to boot. For instructions to overcome a boot block in the standby RP in a single-chassis system,
see Cisco IOS XR ROM Monitor Guide for the Cisco XR 12000 Series Router. If a boot block occurs in
a multishelf system, contact your Cisco Technical Support representative for assistance. See the “Related
Documents” section on page x.
Hardware Prerequisites and Documentation
The Cisco IOS XR software runs on the routers listed in the “Supported Standalone System
Configurations” section on page 1-1. Before a router can be started, the following hardware management
procedures must be completed:
• Site preparation
• Equipment unpacking
• Router installation
For information on how to complete these procedures for your router equipment, see the hardware
documents listed in the “Related Documents” section on page x.
NoteIf you are upgrading a Cisco 12000 Series Router from Cisco IOS software to Cisco IOS XR software,
you must first prepare the router. For more information, see Upgrading from Cisco IOS to Cisco IOS XR
Software on the Cisco 12000 Series Router. For a complete listing of available documents, see the
“Related Documents” section on page x.
2-18
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
Bringing Up and Configuring a Standalone Router
Bringing Up and Configuring a Standalone Router
To bring up a standalone router, connect to the router and configure the root-system username and
password, as described in the following procedure:
SUMMARY STEPS
1. Establish a connection to the DSC Console port.
2. Type the username for the root-system login and press Enter.
3. Type the password for the root-system login and press Enter.
4. Log in to the router.
DETAILED STEPS
Command or ActionPurpose
Step 1
Establish a connection to the DSC Console port.Initiates communication with the router.
• For instructions on connecting to the Console port, see
the “Connecting to the Router Through the Console
Port” section on page 1-10.
• After you have successfully connected to the router
through the Console port, the router displays the
prompt:
Username:
Step 2
Step 3
Step 4
Step 5
• If the Username prompt appears, skip this procedure
and continue the general router configuration as
described in Chapter 4, “Configuring Additional
Router Features.”
Type the username for the root-system login and press
Enter.
Type the password for the root-system login and press
Enter.
Sets the root-system username, which is used to log in to the
router.
Creates an encrypted password for the root-system
username.
NoteThis password can be changed with the secret
command.
Retype the password for the root-system login and
press Enter.
Allows the router to verify that you have entered the same
password both times.
• If the passwords do not match, the router prompts you
to repeat the process.
Log in to the router.Establishes your access rights for the router management
session.
• Enter the root-system username and password that were
created earlier in this procedure.
• After you log in, the router displays the CLI prompt,
which is described in the CLI Prompt.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
2-19
Verifying the System After Initial Boot
Examples
The following example shows the root-system username and password configuration for a new router,
and it shows the initial log in:
--- Administrative User Dialog --Enter root-system username: username1
Enter secret:
Enter secret again:
RP/0/0/CPU0:Jan 10 12:50:53.105 : exec[65652]: %MGBL-CONFIG-6-DB_COMMIT :
'Administration configuration committed by system'. Use 'show configuration
commit changes 2000000009' to view the changes.
Use the 'admin' mode 'configure' command to modify this configuration.
User Access Verification
Username: username1
Password:
RP/0/0/CPU0:router#
The secret line in the configuration command script shows that the password is encrypted. When you
enter the password during configuration and login, the password is hidden.
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
Verifying the System After Initial Boot
To verify the status of the router, perform the following procedure:
SUMMARY STEPS
1. show version
2. admin
3. show platform [node-id]
4. exit
5. show redundancy
6. show environment
2-20
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
DETAILED STEPS
Command or ActionPurpose
Step 1
show version
Example:
RP/0/0/CPU0:router# show version
Step 2
admin
Example:
RP/0/0/CPU0:router# admin
Step 3
show platform [node-id]
Example:
RP/0/0/CPU0:router(admin)# show platform
Step 4
exit
Verifying the System After Initial Boot
Displays information about the router, including image names,
uptime, and other system information.
Places the router in administration EXEC mode.
Displays information about the status of cards and modules
installed in the router.
• Some cards support a CPU module and service processor
(SP) module. Other cards support only a single module.
• A card module is also called a node. When a node is
working properly, the status of the node in the State column
is IOS XR RUN. The status of the supported SPA interface
is OK.
• The show platformnode-id command is used to display
information for a specific node. Replace node-id with a
node name from the show platform command Node
column.
NoteTo view the status of all the cards and modules, the
show platform command must be executed in
administration EXEC mode.
Exits the administration EXEC mode.
Step 5
Step 6
OL-24755-01
Example:
RP/0/0/CPU0:router(admin)# exit
show redundancy
Example:
RP/0/0/CPU0:router# show redundancy
show environment
Example:
RP/0/0/CPU0:router# show environment
Displays the state of the primary (active) and standby (inactive)
RPs, including the ability of the standby to take control of the
system.
• If both RPs are working correctly, one node displays active
role, the Partner node row displays standby role, and the
Standby node row displays Ready.
Displays information about the hardware attributes and status.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
2-21
Verifying the System After Initial Boot
Examples of show Commands
The following sections provide examples of show commands:
• show version Command: Example, page 2-22
• show platform Command: Example, page 2-23
• show redundancy Command: Example, page 2-24
• show environment Command: Example, page 2-25
show version Command: Example
The following example shows how to display basic information about the router configuration by
entering the show version command in EXEC mode:
RP/0/0/CPU0:router# show version
Mon May 31 02:03:29.133 DST
Cisco IOS XR Software, Version 4.1.0[Default]
Copyright (c) 2010 by Cisco Systems, Inc.
ROM: System Bootstrap, Version 12.0(20090226:235859) [rtauro-sw30346-33S 1.23dev
(0.35)] DEVELOPMENT SOFTWARE
Copyright (c) 1994-2009 by cisco Systems, Inc.
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
router uptime is 2 weeks, 6 days, 9 hours, 16 minutes
System image file is "disk0:c12k-os-mbi-4.1.0/mbiprp-rp.vm"
cisco 12406/PRP (7457) processor with 2097152K bytes of memory.
7457 processor at 1266Mhz, Revision 1.2
1 Cisco 12000 Series Performance Route Processor
1 Cisco 12000 Series - Multi-Service Blade Controller
1 Cisco 12000 4-Port ISE ATM Over SONET OC3/STM-1 Controller (4 ATM)
1 Cisco 12000 Series SPA Interface Processor-601/501/401
1 Cisco 12000 Series SPA Interface Processor-600
3 Management Ethernet
6 PLIM_QOS
1 MgmtMultilink
5 SONET/SDH
2 T3
3 Multilink network interface(s)
28 T1
21 E1
21 Serial network interface(s)
5 GigabitEthernet/IEEE 802.3 interface(s)
4 Asynchronous Transfer Mode
1018k bytes of non-volatile configuration memory.
3623092k bytes of disk0: (Sector size 512 bytes).
3623092k bytes of disk1: (Sector size 512 bytes).
65536k bytes of Flash internal SIMM (Sector size 256k).
Configuration register on node 0/0/CPU0 is 0x102
Boot device on node 0/0/CPU0 is disk0:
Package active on node 0/0/CPU0:
c12k-fwding, V 4.1.0[DT_IMAGE], Cisco Systems, at disk0:c12k-fwding-4.1.0.15
I
Built on Thu May 6 17:07:57 DST 2010
By sjc-lds-364 in /auto/ioxbuild6/production/4.1.0.DT_IMAGE/c12k/workspa
ce for pie
2-22
c12k-doc, V 4.1.0[DT_IMAGE], Cisco Systems, at disk0:c12k-doc-4.1.0
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
Built on Thu May 6 20:36:06 DST 2010
show platform Command: Example
The show platform command displays information on router resources. In EXEC mode, the show
platform command displays the resources assigned to the secure domain router (SDR) that you are managing. In administration EXEC mode, the show platform command displays all router resources.
NoteSecure Domain Routers (SDRs) are introduced in Chapter 3, “Configuring General Router Features.”
The following EXEC mode example displays the nodes assigned to the default SDR, which is called the
owner SDR:
RP/0/0/CPU0:router# showplatform
Mon May 31 02:15:07.484 DST
Node Type PLIM State Config State
----------------------------------------------------------------------------0/0/CPU0 PRP(Active) N/A IOS XR RUN PWR,NSHUT,MON
0/1/CPU0 L3 Service Eng N/A Admin Down PWR,SHUT,MON
0/2/CPU0 L3LC Eng 3 OC3-ATM-4 IOS XR RUN PWR,NSHUT,MON
0/3/CPU0 L3LC Eng 5+ Jacket Card IOS XR RUN PWR,NSHUT,MON
0/3/1 SPA SPA-IPSEC-2G-2 READY PWR,NSHUT
0/3/2 SPA SPA-1XCHSTM1/OC READY PWR,NSHUT
0/4/CPU0 L3LC Eng 5 Jacket Card IOS XR RUN PWR,NSHUT,MON
0/4/0 SPA SPA-5X1GE READY PWR,NSHUT
Verifying the System After Initial Boot
The following administration EXEC mode example shows all router nodes:
RP/0/0/CPU0:router# admin
RP/0/0/CPU0:router(admin)# showplatform
Mon May 31 02:18:17.048 DST
Node Type PLIM State Config State
----------------------------------------------------------------------------0/0/CPU0 PRP(Active) N/A IOS XR RUN PWR,NSHUT,MON
0/1/CPU0 L3 Service Eng N/A Admin Down PWR,SHUT,MON
0/2/CPU0 L3LC Eng 3 OC3-ATM-4 IOS XR RUN PWR,NSHUT,MON
0/3/CPU0 L3LC Eng 5+ Jacket Card IOS XR RUN PWR,NSHUT,MON
0/3/1 SPA SPA-IPSEC-2G-2 READY PWR,NSHUT
0/3/2 SPA SPA-1XCHSTM1/OC READY PWR,NSHUT
0/4/CPU0 L3LC Eng 5 Jacket Card IOS XR RUN PWR,NSHUT,MON
0/4/0 SPA SPA-5X1GE READY PWR,NSHUT
0/17/CPU0 CSC6(P) N/A PWD PWR,NSHUT,MON
0/18/CPU0 SFC6 N/A PWD PWR,NSHUT,MON
0/19/CPU0 SFC6 N/A PWD PWR,NSHUT,MON
0/20/CPU0 SFC6 N/A PWD PWR,NSHUT,MON
0/24/CPU0 ALARM6 N/A PWD PWR,NSHUT,MON
0/25/CPU0 ALARM6 N/A PWD PWR,NSHUT,MON
0/28/CPU0 GSR6-BLOWER N/A PWD PWR,NSHUT,MON
RP/0/0/CPU0:router# end
NoteLCs in Cisco CRS routers are called modular services cards (MSCs).
For more information on node IDs, see Cisco IOS XR System Management Configuration Guide for the
Cisco XR 12000 Series Router.
For more information on the show platform command, see Cisco IOS XR Interface and Hardware
Component Command Reference for the Cisco XR 12000 Series Router.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
2-23
Verifying the System After Initial Boot
show redundancy Command: Example
The following example shows how to display information about the active and standby (inactive) RPs by
entering the show redundancy command:
RP/0/0/CPU0:router# showredundancy
Mon May 31 02:22:27.482 DST
Redundancy information for node 0/0/CPU0:
==========================================
Node 0/0/CPU0 is in ACTIVE role
Node 0/0/CPU0 has no valid partner
Reload and boot info
---------------------PRP reloaded Mon May 10 16:47:10 2010: 2 weeks, 6 days, 9 hours, 35 minutes ago
Active node booted Mon May 10 16:47:10 2010: 2 weeks, 6 days, 9 hours, 35 minutes ago
Active node reload "Cause: Turboboot completed successfully"
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
2-24
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
show environment Command: Example
To display environmental monitor parameters for the system, use the show environment command in
EXEC or administration EXEC mode. The show environment [options] command syntax is used.
Enter the show environment ? command to display the command options:
RP/0/0/CPU0:router# show environment temperatures
The following example shows temperature information for a Cisco XR 12000 Series Router:
Mon May 31 02:27:06.397 DST
R/S/I Modules Sensor Temp. (deg C)
For more information, see Cisco IOS XR Interface and Hardware Component Command Reference for
the Cisco XR 12000 Series Router.
Where to Go Next
For information on configuring basic router features, see Configuring General Router Features.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
2-25
Where to Go Next
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
2-26
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Contents
CHAPTER
3
Configuring General Router Features
This chapter describes how to communicate with the router using the command-line interface (CLI), and
it also shows basic Cisco IOS XR software configuration management.
• Secure Domain Routers, page 3-27
• Connecting and Communicating with the Router, page 3-28
• Logging In to a Router or an SDR, page 3-36
• CLI Prompt, page 3-37
• User Access Privileges, page 3-38
• Navigating the Cisco IOS XR Command Modes, page 3-43
• Managing Configuration Sessions, page 3-49
• Configuring the SDR Hostname, page 3-66
• Configuring the Management Ethernet Interface, page 3-66
• Manually Setting the Router Clock, page 3-72
• Where to Go Next, page 3-74
Secure Domain Routers
Cisco XR 12000 Series Routers can be partitioned into multiple, independent routers known as secure
domain routers (SDRs). Every router is shipped with a default SDR, which is called the owner SDR, by
default, owns all RPs and Line Cards (LCs) installed in the routing system. To build additional SDRs,
you must perform the following steps:
• Create each SDR using configuration commands
• Name the SDR
• Assign RP, PRP and LCs to the SDR
• Configure the interfaces on the LCs on the new SDR
An SDR is a group of cards within a router that is configured to operate as an independent router. SDRs
that are created with configuration commands are called SDRs and are configured with custom names to
distinguish them from the owner SDR and other named SDRs.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-27
Connecting and Communicating with the Router
NoteIn previous releases, SDRs were called logical routers (LRs).
SDRs perform routing functions in the same manner as a physical router, but share some chassis
resources with the rest of the system. For example, the applications, configurations, protocols, and
routing tables assigned to an SDR belong to that SDR only, but other functions, such as chassis control,
switch fabric, and partitioning, are shared with the rest of the system.
To manage the owner SDR, you must connect to the active RP for the owner SDR. In administration
configuration mode, you can define new SDRs and assign resources to them (such as DRPs, MSCs, and
line cards). In configuration mode, you can configure the operation of the owner SDR. Although you can
reassign cards from one SDR to another, you cannot configure and manage cards assigned to a
named SDR. To manage cards assigned to a named SDR, you must connect to the appropriate
named SDR.
When you manage a named SDR, you must connect to the active RP for that named SDR. You can
connect to the named SDR using any of the connection methods you use for the owner SDR (for example,
you can connect through the console port or the Management Ethernet interface), and you have control
over only the cards assigned to that named SDR. For example, you cannot configure and manage
interfaces on LCs assigned to the owner SDR or other SDRs unless you connect directly to those SDRs.
Chapter 3 Configuring General Router Features
NoteCisco IOS XR Software Release 3.2 supports multiple SDRs on Cisco XR 12000 Series Routers.
Cisco IOS XR Software Release 3.3 and later releases support multiple SDRs on the Cisco CRS routers
and Cisco XR 12000 Series Routers. For more information, see Cisco IOS XR System Management
Configuration Guide for the Cisco XR 12000 Series Router.
Connecting and Communicating with the Router
To manage or configure a router running Cisco IOS XR software, you must first connect to the router
using a terminal or a PC. Before you connect to the router, you must determine which router entity to
manage. You can manage the following router entities:
• Owner SDR. Connect to the designated shelf controller (DSC).
• Router or multishelf system hardware. Connect to the DSC.
• Named SDR. For Cisco XR 12000 Series Routers, connect to the RP that serves as the DSDRSC for
that named SDR.
Connections are made either through a direct physical connection to the console port of the DSC or
DSDRSC or from a remote location using a modem or an Ethernet connection that leads to the DSC or
DSDRSC.
Figure 3-1 shows the DRP PLIM connections.
Figure 3-2 shows the performance route processor 2 (PRP-2) connections for a
Cisco XR 12000 Series Router.
Figure 3-3 shows the performance route processor 3(PRP-3) connections for a
Cisco XR 12000 Series Router.
3-28
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
The first time a router is started, you must use a direct connection to the DSC Console port to connect
to the router and enter the initial configuration information. When the router is directly connected to the
Console port, enter CLI commands at a terminal or at a computer running terminal emulation software.
This direct Console port connection is useful for entering initial configurations and performing some
debugging tasks.
This chapter describes some of the tasks to perform during your initial configuration. One of those tasks
is the configuration of the Management Ethernet interface, which is described in the “Configuring the
Management Ethernet Interface” section on page 3-66. After the Management Ethernet interface is
configured, most router management and configuration sessions take place over an Ethernet network
connected to the Management Ethernet interface. SNMP agents also use the network connection.
You can use the modem connection for remote communications with the router. If the Management
Ethernet interface fails, the modem connection serves as the alternate remote communications path.
Connecting and Communicating with the Router
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-29
Connecting and Communicating with the Router
STATUS
PRIMARY
CLASS 1 LASER PRODUCT
LASERPRODUKT DER KLASSE 1
PRODUIT LASER DE CLASSE 1
PRODUCTO LASER CLASE 1
11
CLEAN
CONNECTOR
WITH ALCOHOL
WIPES BEFORE
CONNECTING
PIDVIDPIDVID
SN
CLEI
FDA
AUX 0
AUX 1
MGMT ETH 1
MGMT ETH 0
B1
CRS-DRP-ACC
138093
Network
CPU0
AUX connection
CPU0 Console
connection
CPU1
AUX connection
CPU1 Console
connection
Remote CLI, CWI,
XML, or SNMP
communication
Management
Ethernet
connections
for out-of-band
network
communication
CPU0
Ethernet
CPU1
Ethernet
RJ-45 cable
RJ-45 cable
RJ-45 cable
RJ-45 cable
Local terminal or
terminal server for
CLI communication
Remote terminal for
CLI communication
B1
252290
1
0
0
1
2
2
3
4-10GE
3
CLEAN
CONNECTOR
WITH ALCOHOL
WIPES BEFORE
CONNECTING
STATUS
1
Chapter 3 Configuring General Router Features
Figure 3-1Communication Ports on the DRP PLIM
3-30
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
ACT
SIG
ACT
SIG
SLOT-1
SLOT-0
CONSOLEETH 2AUX
RESET
PERFORMANCE ROUTE PROCESSOR 2
BITS 1BITS 0
DATA
LINK
DATA
LINK
ETH 1ETH 0
Terminal connection
Modem connection
User-removable flash disk1
stores installation PIE files
A second internal flash disk0
stores installed software and
active configurations
LED status
displays
(alphanumeric)
Remote CLI, CWI, XML,
or SNMP communication.
Remote file storage
Ethernet cable
Network
Local terminal or
terminal server for
CLI communication
RJ-45 cable
Remote terminal for
CLI communication
RJ-45 cable
Management Ethernet connection for
out-of-band network communication
Connecting and Communicating with the Router
Figure 3-2Communication Ports on the PRP-2 for a Cisco XR 12000 Series Router
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-31
Connecting and Communicating with the Router
Figure 3-3Communication Ports on the PRP-3
13452
1Ejector Lever
2Handle
3External Compact Flash
4Reset button
5Alphanumeric LEDs
Chapter 3 Configuring General Router Features
A
K
T
A
INK
IN
L
L
D
T
TA
A
D
T
G
G
I
I
AC
AC
S
S
RESET
CONSOLE
AUXBITS 1BITS 0ETH 1ETH 0
PERFORMANCE RP 3
272359
The following sections describe three ways to connect to the router:
• Establishing a Connection Through the Console Port, page 3-32
• Establishing a Connection Through a Terminal Server, page 3-34
• Establishing a Connection Through the Management Ethernet Interface, page 3-36
Establishing a Connection Through the Console Port
To connect to the router through the console port, perform the following procedure.
SUMMARY STEPS
1. Identify the active RP or DRP.
2. Connect a terminal to the Console port of the active RP or DRP.
3. Start the terminal emulation program.
4. Press Enter.
5. Log in to the router.
3-32
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
DETAILED STEPS
Command or ActionPurpose
Step 1
Step 2
Identify the active RP or DRP.Identifies the RP or DRP to which you must connect in the next step.
Connect a terminal to the Console port
of the active RP or DRP.
Connecting and Communicating with the Router
• This step is not required when the router hosts only one RP.
• On a Cisco XR 12000 Series Router, the active RP is identified by the
alphanumeric display: ACTV RP.
•
Establishes a communications path to the router.
• During the initial setup, you can communicate with the router only
through the console port of the active RP.
• Router console port is designed for a serial cable connection to a
terminal or a computer that is running a terminal emulation program.
• Terminal settings are:
–
Bits per second: 9600 (default value)
Step 3
–
Data bits: 8
–
Parity: None
–
Stop bit: 2
–
Flow control: None
• For information on the cable requirements for the console port, see the
hardware documentation listed in the “Related Documents” section on
page x.
Start the terminal emulation program.(Optional) Prepares a computer for router communications.
• This step is not required if you are connecting through a terminal.
• Terminals send keystrokes to, and receive characters from, another
device. If you connect a computer to the Console port, you must use a
terminal emulation program to communicate with the router. For
instructions on using a terminal emulation program, see the hardware
documentation listed in the “Related Documents” section on page x.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-33
Connecting and Communicating with the Router
Command or ActionPurpose
Step 4
Step 5
Press Enter.Initiates communication with the router.
Log in to the router.Establishes your access rights for the router management session.
Chapter 3 Configuring General Router Features
• If no text or router prompt appears when you connect to the Console
port, press Enter to initiate communications.
• If no text appears when you press Enter and the router has been
started recently, give the router more time to complete the initial boot
procedure, then press Enter.
• If the router has no configuration, the router displays the prompt:
Enter root-system username:. For more information on when a
standalone router is starting up for the first time, see Chapter 2,
“Bringing Up the Cisco IOS XR Software on a Standalone Router.”
• If the router has been configured, the router displays the prompt:
Username:
• Enter the username and password, as described in the “Logging In to
a Router or an SDR” section on page 3-36.
• After you log in, the router displays the CLI prompt, which is
described in the “CLI Prompt” section on page 3-37.
Establishing a Connection Through a Terminal Server
A terminal server connection provides a way to access the Console port from a remote location. It is less
expensive to connect to the router through the Management Ethernet interface (because you do not have
the additional cost of a terminal server). However, if you need to perform tasks that require Console port
access from a remote location, a terminal server is the best method.
The procedure for connecting to the router through a terminal server is similar to the procedure for
directly connecting through the Console port. For both connection types, the physical connection takes
place through the Console port. The difference is that the terminal server connects directly to the Console
port, and you must use a Telnet session to establish communications through the terminal server to the
router.
To establish a connection through a terminal server, perform the following procedure.
SUMMARY STEPS
1. Install and configure the terminal server.
2. Connect the terminal server to the Console port of the target RP or DRP.
3. Power on the router.
3-34
4. Identify the target RP or DRP.
5. telnet access-server-address port
6. Press Enter.
7. Log in to the router.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
DETAILED STEPS
Command or ActionPurpose
Step 1
Install and configure the terminal
server.
Step 2
Connect the terminal server to the
Console port of the target RP or DRP.
Connecting and Communicating with the Router
Prepares the terminal server for communications with the router and with
Telnet clients.
• This step is usually preformed once.
• For router access, users need the Telnet server IP address and port
number for each RP they access.
• For additional information on configuring terminal services, including
terminal servers and templates, see Cisco IOS XR System Management
Configuration Guide for the Cisco XR 12000 Series Router.
Establishes a communications path between the terminal server and the
router.
• During the initial router setup, you can communicate with the router
only through the Console port of the primary RP.
• The router Console port is designed for a serial cable connection to a
terminal or terminal server.
• The terminal settings are:
–
Bits per second: 9600(default value)
Step 3
Step 4
Step 5
–
Data bits: 8
–
Parity: None
–
Stop bit: 2
–
Flow control: None
• For information on the cable requirements for the Console port, see
the hardware documentation listed in the “Related Documents”
section on page x.
•
Power on the router.Starts the router.
• This step is required only if the router power is not on.
• For information on power installation and controls, see the hardware
documentation listed in the “Related Documents” section on page x.
Identify the target RP or DRP.Identifies the RP or DRP to which you connect in the next step.
• This step is not required when the router hosts only one RP or DRP.
• On a Cisco XR 12000 Series Router, the active RP is identified by the
alphanumeric display: ACTV RP.
• If you cannot see the RPs, use a Management Ethernet interface
connection to determine which RP is active, or establish terminal
server connections to both RPs and then try both.
telnet access-server-address port
Establishes a Telnet session with the terminal server.
OL-24755-01
• Replace access-server-address with the IP address of the terminal
server, and replace port with the terminal server port number that
connects to the target RP Console port.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-35
Chapter 3 Configuring General Router Features
Logging In to a Router or an SDR
Command or ActionPurpose
Step 6
Press Enter.(Optional) Initiates communications with the RP or DRP.
• If no text or router prompt appears when you start the Telnet session,
press Enter to initiate communications.
• If the router has no configuration, the router displays the prompt:
Enter root-system username: Enter the root-system username and
password when prompted.
• If the router has been configured, the router displays the prompt:
Username:
Step 7
Log in to the router.Establishes your access rights for the router management session.
• Enter a username and password when prompted.
Establishing a Connection Through the Management Ethernet Interface
The Management Ethernet interface allows you to manage the router using a network connection. Before
you can use the Management Ethernet interface, the interface must be configured as described in the
“Configuring the Management Ethernet Interface” section on page 3-68.
After it is configured, the network connection takes place between client software on a workstation
computer and a server process within the router. The type of client software you use depends on the
server process to use. The Cisco IOS XR software supports the following client and server services:
• Telnet clients can connect to a Telnet server in the router. The Telnet server is disabled by default
and can be enabled with the telnet ipv4 server or telnet ipv6 server command in global
configuration mode.
• Secure Shell (SSH) clients can connect to an SSH server in the router. The SSH server is disabled
by default and can be enabled with the ssh server command in global configuration mode. The SSH
server handles both Secure Shell Version 1 (SSHv1) and SSHv2 incoming client connections for
both IPv4 and IPv6 address families. The SSHv2 client is enhanced and can now execute commands
remotely without invoking a secure interactive session.
To start a Telnet network connection, start the Telnet client software with a command similar to the
following:
telnet ManagementEthernetInterfaceIPaddress
For specific instructions on connecting to the router through a Telnet or SSH client, see the instructions
for that software.
Ask your system administrator for the IP address of the Management Ethernet interface.
When the Telnet session is established, the router prompts you to log in, as described in the “Logging In
to a Router or an SDR” section on page 3-36.
Logging In to a Router or an SDR
The login process can require users to enter a password or a username and password before accessing
the router CLI. The user groups to which your username is assigned determine which commands you can
use.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-36
OL-24755-01
Chapter 3 Configuring General Router Features
If you log in to a router with a single SDR configured (this is the default configuration), you can manage
the entire router.. If you log in to a named SDR, you can manage only that SDR. For more information
on SDRs, see the “Secure Domain Routers” section on page 3-27.
When you log in, the username and password may be validated by any of the following services:
• Usernames configured on the router (username command in global configuration mode)
• Root-system usernames configured on the owner SDR
• Passwords configured for the router console and auxiliary ports (password or secret command in
line configuration mode)
• RADIUS server
• TAC ACS+ serv e r
The username and password validation method that your router uses is determined by the router
configuration. For information on configuring username and password validation methods, see
Cisco IOS XR System Security Configuration Guide for the Cisco XR 12000 Series Router. For
information on which username and password to use, see your system administrator.
To log in to the router, enter your username and password when prompted. For example:
User Access Verification
CLI Prompt
NotePasswords are case sensitive. To log in to an SDR using a root-system username from the owner SDR,
enter the username in the following format: username@admin. To support admin login, local database
authentication must be enabled with the aaa authentication login remote local command. For more
information, see Cisco IOS XR System Security Configuration Guide for the Cisco XR 12000 Series Router.
After you log in, the router displays the CLI prompt, which is described in the “CLI Prompt” section on
page 3-37. The command set that you can use is determined by the privileges assigned to your username.
For information on how privileges are assigned to usernames, see Cisco IOS XR System Security Configuration Guide for the Cisco XR 12000 Series Router.
After you log in, you see the CLI prompt for the Cisco IOS XR software. This prompt identifies the
router or SDR to which you are issuing commands. The CLI prompt represents the path, through the
router, to the CPU that executes the commands you enter. The syntax for the CLI prompt is:
type/rack/slot/module: router-name#. Table 3 -1 describes the CLI prompt.
OL-24755-01
Table 3-1CLI Prompt Description
Prompt Syntax ComponentDescription
typeType of interface or card with which you are communicating. For
most user communication tasks, the type is “RP”.
rackRack number. In a standalone router, the rack number is always “0”.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-37
User Access Privileges
Chapter 3 Configuring General Router Features
Table 3-1CLI Prompt Description (continued)
Prompt Syntax ComponentDescription
slotSlot in which the RP or DRP is installed. In a
Cisco XR 12000 Series Router, the physical slot number can be 0 to
15, and there can be multiple SDRs, each of which is represented by
an RP.
moduleEntity on a card that executes user commands or communicates with
a port (interface). For executing commands from the EXEC prompt,
the module is the “CPU0” of the RP. “CPU0” also controls the
forwarding and operating system (OS) functions for the system.
DRPs have two processors: CPU0 and CPU1.
router-nameHostname of the router or SDR. The hostname is usually defined
during initial configuration of the router, as described in the
“Configuring the SDR Hostname” section on page 3-66.
For example, the following prompt indicates that the CLI commands are executed on the RP in rack 0,
slot RP0, by the “CPU0” module on a router named “router”:
RP/0/0/CPU0:router#
User Access Privileges
When you log in to the router, your username and password are used to determine if you are authorized
to access the router. After you successfully log in, your username is used to determine which commands
you are allowed to use. The following sections provide information on how the router determines which
commands you can use:
• User Groups, Task Groups, and Task IDs, page 3-39
• Predefined User Groups, page 3-40
• Displaying the User Groups and Task IDs for Your User Account, page 3-41
3-38
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
User Groups, Task Groups, and Task IDs
The Cisco IOS XR software ensures security by combining tasks a user wants to perform (task IDs) into
groups, defining which router configuration and management functions users can perform. This policy
is enabled by the definition of:
• User groups—Collection of users that share similar authorization rights on a router.
• Task groups—Definition of collection of tasks identified by unique task IDs for each class of action.
• Task IDs—Definition of permission to perform particular tasks; pooled into a task group that is then
assigned to users.
The commands you can perform are defined by the user groups to which you belong. Within the Cisco
IOS XR software, the commands for a particular feature, like access control lists, are assigned to tasks.
Each task is uniquely identified by a task ID. To use a particular command, your username must be
associated with the appropriate task ID.
The association between a username and a task ID takes place through two intermediate entities, the user
group and task group.
The user group is a logical container used to assign the same task IDs to multiple users. Instead of
assigning task IDs to each user, you can assign them to the user group. Then, you can assign users to that
user group. When a task is assigned to a user group, you can define the access rights for the commands
associated with that task. These rights include “read”, “write”, “execute”, and “notify”.
User Access Privileges
The task group is also a logical container, but it is used to group tasks. Instead of assigning task IDs to
each user group, you assign them to a task group. This allows you to quickly enable access to a specific
set of tasks by assigning a task group to a user group.
To summarize the associations, usernames are assigned to user groups, which are then assigned to task
groups. Users can be assigned to multiple user groups, and each user group can be assigned to one or
more task groups. The commands that a user can execute are all those commands assigned to the tasks
within the task groups that are associated with the user groups to which the user belongs.
Users are not assigned to groups by default and must be explicitly assigned by an administrator.
The following example shows how you can display all task IDs available on the system with the show task supported command.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-39
User Access Privileges
ppp
hdlc
--More--
NoteOnly the root-system users, root-lr users, or users associated with the WRITE:AAA task ID can
configure task groups. (The root-lr user has the highest level of privileges in an SDR. In previous
releases, SDRs were called logical routers [LRs].)
Predefined User Groups
Cisco IOS XR software includes a set of predefined user groups that meets the needs of most
organizations. Tab le 3 -2 describes predefined user groups.
Table 3-2Predefined User Group Descriptions
User GroupPrivileges
root-systemDisplay and execute all commands for all SDRs in the system.
root-lrDisplay and execute all commands within a single SDR.
sysadminPerform system administration tasks for the router, such as
serviceadminPerform service administration tasks for the router, such as
netadminConfigure network protocols, such as BGP
operatorPerform day-to-day monitoring activities, and have limited
cisco-supportDebug and troubleshoot features (usually, used by Cisco Technical
1. NTP stands for Network Time Protocol
2. BGP stands for Border Gateway Protocol
3. Open Shortest Path First
Chapter 3 Configuring General Router Features
maintaining where the core dumps are stored or setting up the NTP
clock.
configuring firewall and sbc.
2
and OSPF3 (usually used
by network administrators).
configuration rights.
Support personnel).
1
3-40
Although the predefined user groups are sufficient for the needs of most organizations, administrators
can configure their own groups. For more information, see Cisco IOS XR System Security Configuration
Guide for the Cisco XR 12000 Series Router.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
Displaying the User Groups and Task IDs for Your User Account
To display the user groups and task IDs associated with your account, enter the show user command in
EXEC mode. Table 3 -3 summarizes the options available for this command.
Table 3-3Options to Display Information About Your Account
Command Description
show userDisplays your user name.
show user groupDisplays the user groups assigned to your
account.
show user tasksDisplays the task IDs assigned to your account.
show user allDisplays all user groups and task ID information
for your account.
show aaausergroup group-nameDisplays the task IDs assigned to a user group.
User Access Privileges
Examples
The following examples show how to view user privileges:
• show user Command: Example, page 3-41
• show user tasks Command: Example, page 3-41
• show user group Command: Example, page 3-42
• show aaa usergroup Command: Example, page 3-42
show user Command: Example
To display your username, enter the show user command:
RP/0/0/CPU0:router# showuser
username1
show user tasks Command: Example
To display the tasks assigned to your account and your rights to those tasks, enter the show user tasks
command:
To display the user groups assigned to your user account, enter the show user group command:
RP/0/0/CPU0:router# show user group
Mon May 31 02:53:59.933 DST
root-system, cisco-support
show user all Command: Example
Chapter 3 Configuring General Router Features
To display all user groups and task ID information for your account, enter the show user all command:
RP/0/0/CPU0:router# show user all
Mon May 31 02:54:51.446 DST
Username: cisco
Groups: root-system, cisco-support
Authenticated using method local
User cisco has the following Task ID(s):
The Cisco IOS XR Software has different command modes. Each mode provides access to a subset of
commands used to configure, monitor, and manage the router. Access to a mode is determined by your
user group assignments. The following sections describe the navigation of the command modes:
• Identifying the Command Mode in the CLI Prompt, page 3-44
• Summary of Common Command Modes, page 3-45
• Entering EXEC Commands from a Configuration Mode, page 3-47
• Command Mode Navigation Example, page 3-48
Figure 3-4 illustrates the basic command mode navigation for the CLI. Only a small sample of the
possible configuration modes is shown.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-43
Navigating the Cisco IOS XR Command Modes
149947
EXEC mode
Login
Interface
configuration submode
Configuration submode
examples
Router
configuration submode
Line template
configuration submode
Task group
configuration submode
Global configuration modeAdministration configuration mode
Logical router configuration submode
Administration EXEC mode
Figure 3-4Example of Command Mode Navigation in Cisco IOS XR software
Chapter 3 Configuring General Router Features
Identifying the Command Mode in the CLI Prompt
The command mode is identified in the CLI prompt after the router name.
When the router enters global configuration mode from the EXEC mode, the CLI prompt changes to
include “(config)” after the router name:
Tabl e 3-4 summarizes the most common command modes of the Cisco IOS XR software and the
associated CLI prompts.
Table 3-4Common Command Modes and CLI prompts
Command ModeDescription
EXECAutomatically places the router in EXEC mode when logging in to an SDR running the
Cisco IOS XR software.
Example:
RP/0/0/CPU0:router#
EXEC mode enables a basic set of commands to display the operational state of an SDR and the
Cisco IOS XR software. Most CLI commands in EXEC mode do not change the SDR operation. The
most common EXEC commands are show commands (to display SDR configuration or operational
data) and clear commands (to clear or reset SDR counters).
In EXEC mode, you can display the configuration of an SDRbut not the configuration of the system.
The difference is that SDRs are defined in administration configuration mode, which is a submode
of administration EXEC mode. SDRs are configured in global configuration mode.
Additional commands are available depending on the access privileges (user groups) assigned to
your username. Minimal privileges also include a small set of EXEC commands for connecting to
remote devices, changing terminal line settings on a temporary basis, and performing basic tests.
Administration EXEC Manages system resources. In administration EXEC mode, you can display the configuration of the
system but not the configuration of an SDR. The difference is that SDRs are defined in
administration configuration mode, which is a submode of administration EXEC mode. SDRs are
configured in global configuration mode.
Administration EXEC mode is used primarily to display system-wide parameters, configure the
administration plane over the control Ethernet, and configure SDR. These operations are available
only to users with the required root level access.
From EXEC mode, use the admin command to enter administration EXEC mode:
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-45
Chapter 3 Configuring General Router Features
Navigating the Cisco IOS XR Command Modes
Table 3-4Common Command Modes and CLI prompts (continued)
Command ModeDescription
Global configurationGlobal configuration mode is the starting point for SDR configuration. Commands entered in this
mode affect the SDR as a whole, rather than just one protocol or interface. Global configuration
mode is also used for entering configuration submodes to configure specific elements, such as
interfaces or protocols.
To enter global configuration mode, enter the configure command at the EXEC command prompt:
NoteThe system prompt changes to router(config) to indicate that the router is now in global
configuration mode.
Configuration
submodes
From the global configuration mode, you can also enter other, more specific command modes. These
modes are available based on your assigned access privileges and include protocol-specific,
platform-specific, and feature-specific configuration modes.
In the following example, MPLS LDP configuration mode is entered from global configuration
mode. The prompt for MPLS LDP configuration submode appears as config-ldp. The following
command syntax is used for entering configuration MPLS LDP submode:
NoteThe availability of any particular mode depends on the router features and the access rights
of the individual user. For example, a configuration mode for configuring access servers is
not available on most routers.
Interface configuration The interface configuration submode is used to select and configure a hardware interface. To enter
interface configuration mode from global configuration mode, use an interface command. An
interface configuration command always follows an interface global configuration command, which
defines the interface type. The following command syntax is used for entering interface
configuration submode:
Router configurationThe router configuration submode is used to select and configure a routing protocol, such as BGP,
OSPF, or IS-IS. The router protocol [protocol_options] command syntax is used for entering router
configuration submode.
Replace protocol with the keyword for the protocol to configure. Replace protocol_options with any
keywords and arguments required for that protocol. In the following example, the router enters the
router configuration mode for BGP:
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
Table 3-4Common Command Modes and CLI prompts (continued)
Command ModeDescription
Router submode
configuration
Router configuration submodes are accessed from router configuration mode. The following
command syntax is used for entering router address family configuration submode:
For more information, see the following Cisco documents:
• Cisco IOS XR Routing Configuration Reference for the Cisco XR 12000 Series Router
• Cisco IOS XR Routing Command Reference for the Cisco XR 12000 Series Router
•
ROM Monitor
(ROMMON)
The ROM Monitor is a bootstrap program that initializes the hardware and boots the system when a
router is powered on or reset. ROM Monitor mode is also known as ROMMON, which reflects the
CLI prompt for the mode.
rommon B1>
Navigating the Cisco IOS XR Command Modes
During normal operation, users do not interact with ROMMON. This mode is accessed only by
manually interrupting the boot process and placing the system in ROMMON. Once in ROMMON,
you can perform ROM Monitor tasks, including reinstallation of the Cisco IOS XR software,
password recovery, and other diagnostic tasks.
The ROM Monitor CLI mode is accessible only from a terminal connected directly to the Console
port of the primary RP, a terminal-modem connection to the AUX port, or through a terminal server.
For information and instructions on using ROM Monitor mode, see Cisco IOS XR ROM Monitor
Guide for the Cisco XR 12000 Series Router.
For information and instructions on using ROM Monitor mode, see Cisco IOS XR ROM Monitor Guide for information and instructions on using ROM Monitor mode.
Entering EXEC Commands from a Configuration Mode
EXEC commands can be executed from any configuration mode by preceding the command with the do
keyword. Executing EXEC commands from a configuration mode allows you to display the state of the
system without exiting the configuration mode. For example:
RP/0/0/CPU0:router(config)# do show version
Mon May 31 02:52:07.240 DST
Cisco IOS XR Software, Version 4.1.0[Default]
Copyright (c) 2010 by Cisco Systems, Inc.
OL-24755-01
ROM: System Bootstrap, Version 12.0(20090226:235859) [rtauro-sw30346-33S 1.23dev(0.35)]
DEVELOPMENT
SOFTWARE
Copyright (c) 1994-2009 by cisco Systems, Inc.
PE6_C12406 uptime is 2 weeks, 6 days, 10 hours, 4 minutes
System image file is "disk0:c12k-os-mbi-4.1.0/mbiprp-rp.vm"
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-47
Navigating the Cisco IOS XR Command Modes
cisco 12406/PRP (7457) processor with 2097152K bytes of memory.
7457 processor at 1266Mhz, Revision 1.2
1 Cisco 12000 Series Performance Route Processor
1 Cisco 12000 Series - Multi-Service Blade Controller
1 Cisco 12000 4-Port ISE ATM Over SONET OC3/STM-1 Controller (4 ATM)
1 Cisco 12000 Series SPA Interface Processor-601/501/401
1 Cisco 12000 Series SPA Interface Processor-600
3 Management Ethernet
6 PLIM_QOS
1 MgmtMultilink
5 SONET/SDH
2 T3
3 Multilink network interface(s)
28 T1
21 E1
21 Serial network interface(s)
5 GigabitEthernet/IEEE 802.3 interface(s)
4 Asynchronous Transfer Mode
1018k bytes of non-volatile configuration memory.
3623092k bytes of disk0: (Sector size 512 bytes).
3623092k bytes of disk1: (Sector size 512 bytes).
65536k bytes of Flash internal SIMM (Sector size 256k).
Chapter 3 Configuring General Router Features
Configuration register on node 0/0/CPU0 is 0x102
Boot device on node 0/0/CPU0 is disk0:
Package active on node 0/0/CPU0:
c12k-fwding, V 4.1.0[DT_IMAGE], Cisco Systems, at disk0:c12k-fwding-4.1.0
Built on Thu May 6 17:07:57 DST 2010
By sjc-lds-364 in /auto/ioxbuild6/production/4.1.0.DT_IMAGE/c12k/workspace for pie
--More--
Command Mode Navigation Example
The following steps provide an example of command mode navigation:
Step 1Start a session by logging in to the router and entering EXEC mode, as shown in the following example:
From EXEC mode you can issue EXEC commands or enter global configuration mode. Examples of
EXEC commands are the show commands used to display system status and clear commands to clear
counters or interfaces.
Step 2Add ? at the end of the prompt, or after a command, to display the available options:
RP/0/0/CPU0:router# show ?
3-48
MgmtMultilink Show trace data for the multilink controller component
aaa Show AAA configuration and operational data
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
access-lists Access lists
address-pool Local address pool
adjacency Adjacency information
af-ea AF-EA Platform details
aliases Display alias commands
app-obj APP-OBJ Show Commands
aps SONET APS information
aqsm AQSM show commands
aqsmlib AQSMLIB show commands
arm IP ARM information
arp ARP show commands
arp-gmp ARP show commands
asic-errors ASIC error information
atc Attractor Cache related
atm ATM information
atm-vcm Show atm_vcm component
attractor Show commands for attractor process
attribute IM Attributes operations information
auto-rp Auto-RP Commands
bcdl Show Bulk Content DownLoader information
bfd BFD information
--More--
Managing Configuration Sessions
NoteThe commands available depend on the router mode and your user group assignments.
Step 3If you belong to a user group that has configuration privileges, you can place the router in the global
configuration mode by entering the configure command:
Step 4From global configuration mode, you can place the router in a configuration submode, such as interface
configuration mode or a protocol-specific configuration mode.
In the following example, the router enters interface configuration mode and the user selects a POS
interface for configuration. The command syntax is interface type rack/slot/module/port.
The command mode prompt changes from (config) to (config-if) and you can now enter configuration
commands for the specified interface.
Step 5To exit interface configuration mode and return to global configuration mode, enter the exit command.
To return to EXEC mode, enter the end command.
Managing Configuration Sessions
OL-24755-01
In the Cisco IOS XR software, you cannot change the running (active) configuration directly. Enter
configuration changes into an inactive target configuration. When the target configuration is ready for
use, you can apply that configuration to the router with the commit command. This two-stage process
allows you to make, edit, and verify configuration changes before impacting the actual running state of
the router.
Figure 3-5 shows the two-stage configuration process.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-49
Managing Configuration Sessions
EXEC mode
Global
configuration
mode
Administration
mode
Administration
configuration
mode
Stage 1:
Enter configuration
changes or load a
saved configuration.
Save configuration
changes to a file.
Stage 2:
"Commit" changes
to the running
configuration.
Figure 3-5Two-Stage Configuration Process
Global configuration mode is used to configure SDR features, such as routing protocols and interfaces.
Administration configuration mode is used to assign hardware components to SDRs.
Chapter 3 Configuring General Router Features
3-50
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
The following sections describe the management options for configuration sessions:
• Displaying the Active Configuration Sessions, page 3-51
• Starting a Configuration Session, page 3-52
• Starting an Exclusive Configuration Session, page 3-53
• Displaying Configuration Details with show Commands, page 3-54
• Saving the Target Configuration to a File, page 3-60
• Loading the Target Configuration from a File, page 3-61
• Loading an Alternative Configuration at System Startup, page 3-61
• Clearing All Changes to a Target Configuration, page 3-61
• Committing Changes to the Running Configuration, page 3-62
• Reloading a Failed Configuration, page 3-64
• Exiting a Configuration Submode, page 3-64
• Returning Directly to Configuration Mode from a Submode, page 3-65
• Ending a Configuration Session, page 3-65
Managing Configuration Sessions
• Aborting a Configuration Session, page 3-65
• Configuring the SDR Hostname, page 3-66
• Configuring the Management Ethernet Interface, page 3-66
• Specifying the Management Ethernet Interface Name in CLI Commands, page 3-67
• Displaying the Available Management Ethernet Interfaces, page 3-67
• Configuring the Management Ethernet Interface, page 3-68
Displaying the Active Configuration Sessions
Before you start a configuration session, you should check if there are other configuration sessions in
progress. More than one user can open a target configuration session at a time, allowing multiple users
to work on separate target configurations.
The procedure for viewing the active configuration sessions depends on the type of configuration
session. For administration configuration sessions, which assign hardware components in SDRs and
multishelf systems, you must be in administration EXEC mode to view the active administration
configuration sessions. For SDR configuration sessions, you must be in EXEC mode to view the active
SDR configuration sessions.
To view the active administration configuration sessions, connect to the DSC and enter the show configuration sessions command in administration EXEC mode, as shown in the following example:
RP/0/0/CPU0:router# admin
RP/0/0/CPU0:router(admin)# show configuration sessions
OL-24755-01
Session Line User Date Lock
00000201-002180dd-00000000 vty0 cisco Thu Mar 16 14:47:08 2006
To view the active SDR configuration sessions, connect to the appropriate SDR and enter the show
configuration sessions command in EXEC mode, as shown in the following example:
RP/0/0/CPU0:router# show configuration sessions
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-51
Managing Configuration Sessions
Current Configuration Session Line User Date
Lock
00000201-002180dd-00000000 vty0 test Thu Mar 16 13:16:17 2006
00000201-001b307a-00000000 vty2 cisco Thu Mar 16 13:16:17 2006 *
If an asterisk (*) appears in the Lock column, the user is using an exclusive configuration session and
you cannot start a configuration session until the exclusive configuration session closes. For more
information, see the “Starting an Exclusive Configuration Session” section on page 3-53.
NoteConfiguration sessions for administration configuration and each SDR are managed independently. For
example, if a user locks the administration configuration, you can still configure an SDR if other users
have not locked a configuration session for that SDR.
Starting a Configuration Session
When you place the router in global configuration mode or administration configuration mode using the
configure command, a new target configuration session is created. The target configuration allows you
to enter, review, and verify configuration changes without impacting the running configuration.
Chapter 3 Configuring General Router Features
NoteThe target configuration is not a copy of the running configuration. It has only the configuration
commands entered during the target configuration session.
While in configuration mode, you can enter all Cisco IOS XR software commands supported in that
configuration mode. Each command is added to the target configuration. You can view the target
configuration by entering the show configuration command in configuration mode. The target
configuration is not applied until you enter the commit command, as described in the “Committing
Changes to the Running Configuration” section on page 3-62.
You can save target configurations to disk as nonactive configuration files. These saved files can be
loaded, further modified, and committed at a later time. For more information, see the “Saving the Target
Configuration to a File” section on page 3-60.
Examples
The following examples show how to manage configuration sessions:
• Simple Owner SDR Configuration: Example, page 3-52
• Simple Administration Configuration Session: Example, page 3-53
Simple Owner SDR Configuration: Example
The following example shows a simple owner SDR configuration session in which the target
configuration is created and previewed in global configuration mode:
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
ipv4 address 10.10.10.10 255.0.0.0
end
Simple Administration Configuration Session: Example
The following example shows a simple administration configuration session in which the target
configuration is created and previewed in administration configuration mode:
RP/0/0/CPU0:router# admin
RP/0/0/CPU0:router(admin)# configure
RP/0/0/CPU0:router(admin-config)# sdr test
RP/0/0/CPU0:router(admin-config-sdr:test)# location 0/1/SP
RP/0/0/CPU0:router(admin-config-sdr:test)# show configuration
Building configuration...
sdr test
location 0/1/SP
!
end
Starting an Exclusive Configuration Session
Managing Configuration Sessions
An exclusive configuration session allows you to configure the administration configuration or an SDR
and lock out all users from committing configuration changes until you are done. Other users can still
create and modify a target configuration, but they cannot commit those changes to the running
configuration until you exit your exclusive configuration session.
During regular configuration sessions, the running configuration is locked whenever a commit operation
is being performed. This automatic locking ensures that each commit operation is completed before the
next one begins. Other users receive an error message if they attempt to commit a target configuration
while another commit operation is under way.
To start an exclusive configuration session for an SDR, connect to that SDR and enter the configure exclusive command:
NoteIf the configuration is already locked by another user, the configure exclusive command fails. To view
locked and unlocked configuration sessions, see the “Displaying the Active Configuration Sessions”
section on page 3-51.
To start an exclusive configuration session for the administration configuration, connect to the DSC and
enter the configure exclusive command in administration EXEC mode:
The running configuration is unlocked when the user who started the exclusive configuration session
exits the configuration mode, as described in the “Ending a Configuration Session” section on page 3-65.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-53
Chapter 3 Configuring General Router Features
Managing Configuration Sessions
Displaying Configuration Details with show Commands
The following sections describe the following tasks:
• Displaying the Running Configuration, page 3-54
• Displaying a Sanitized Version of the Running Configuration, page 3-56
• Displaying the Target Configuration, page 3-58
• Displaying a Combined Target and Running Configuration, page 3-58
• Displaying Configuration Error Messages and Descriptions, page 3-59
• Displaying Configuration Error Messages Without Descriptions, page 3-60
• Displaying Configuration Error Messages Produced While Loading a Configuration, page 3-60
Displaying the Running Configuration
The running configuration is the committed configuration that defines the router operations, and it is
divided into the administration configuration and an SDR configuration for each SDR. The portion of
the running configuration that you can view depends on the current CLI mode and SDR connection.
In EXEC mode and global configuration mode, you can view the SDR configuration for the SDR to
which you are connected. When you are connected to the DSC and operating in administration EXEC
and administration configuration mode, you can view the administration configuration, which includes
hardware assignments for SDRs and multishelf systems.
To display the SDR portion of the running configuration, connect to the appropriate SDR and enter the
show running-config command in EXEC or global configuration mode, as shown in the following
example:
RP/0/0/CPU0:router(config)# show running-config
Building configuration...
!! Last configuration change at 11:05:38 UTC Mon May 02 2005 by cisco
!
hostname router
logging console debugging
telnet ipv4 server max-servers 5
username iosxr
password 7 011F0706
group root-system
group cisco-support
!
ntp
interface Loopback99
broadcast
!
interface Loopback999
broadcast
!
interface Loopback9999
broadcast
!
authenticate
max-associations 2000
!
interface Loopback0
ipv4 address 10.1.2.3 255.255.0.0
load-interval 0
!
3-54
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-55
Managing Configuration Sessions
To display the administration portion of the running configuration, connect to the DSC and enter the
show running-config command in administration EXEC or administration configuration mode, as
shown in the following example:
RP/0/0/CPU0:router(admin)# show running-config
Building configuration...
sdr test
location 0/1/* primary
!
username username1
secret 5 $1$SegP$9jcoyk09S5cM.h/tX36yj.
group root-system
!
end
Displaying a Sanitized Version of the Running Configuration
A sanitized running configuration report displays the contents of the running configuration without
installation specific parameters. Some configuration details, such as IP addresses, are replaced with
different addresses. The sanitized configuration can be used to share a configuration without exposing
the configuration details.
In EXEC and global configuration mode, you can view the sanitized SDR configuration for the SDR to
which you are connected. When you are connected to the SDR and operating in administration EXEC
and administration configuration mode, you can view the sanitized administration configuration, which
includes hardware assignments for SDRs.
To display the sanitized SDR portion of the running configuration, enter the show running-config sanitized command in EXEC or global configuration mode, as shown in the following example:
RP/0/0/CPU0:router(config)# show running-config sanitized
Chapter 3 Configuring General Router Features
Building configuration...
!! Last configuration change at 11:05:38 UTC Mon May 02 2005 by <removed>
!
hostname <removed>
logging console debugging
telnet ipv4 server max-servers 5
username <removed>
password 7 <removed>
group root-system
group cisco-support
!
ntp
interface Loopback99
broadcast
!
interface Loopback999
broadcast
!
interface Loopback9999
broadcast
!
authenticate
max-associations 2000
!
interface Loopback0
ipv4 address 10.0.0.0 255.0.0.0
load-interval 0
!
3-56
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
To display the sanitized administration portion of the running configuration, connect to the DSC and
enter the show running-config sanitized command in administration EXEC or administration
configuration mode, as shown in the following example:
RP/0/0/CPU0:router(admin)# show running-config sanitized
Mon May 31 21:35:14.902 DST
Building configuration...
!! IOS XR Admin Configuration 4.1.0
sdr <removed>
location 0/1/*
location 0/4/* primary
!
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-57
Managing Configuration Sessions
username <removed>
group root-system
group cisco-support
secret 5 <removed>
!
end
Displaying the Target Configuration
The target configuration includes the configuration changes that have been entered but not yet
committed. These changes are not yet part of the running configuration.
You can view the target configuration in global configuration and administration configuration modes.
You cannot view the target configuration in EXEC modes because the target configuration must be
committed or abandoned before returning to EXEC or administration EXEC mode.
To display the target configuration changes you have entered for an SDR, enter the show configuration
command in global configuration mode or in any submode, as shown in the following example:
RP/0/0/CPU0:router(config-if)# show configuration
Building configuration...
interface POS0/3/0/3
description faq
ipv4 address 10.1.1.1 255.0.0.0
end
Chapter 3 Configuring General Router Features
To display the target administration configuration changes you have entered, enter the show
configuration command in administration configuration mode or in any submode, as shown in the
following example:
RP/0/0/CPU0:router(admin-config-sdr:test)# show configuration
Building configuration...
sdr test
location 0/1/* primary
!
end
Displaying a Combined Target and Running Configuration
Although the target and running configurations remain separate until the target configuration is
committed, you can preview the combined target and running configuration without committing the
changes. The combined configuration shows what the new running configuration will look like after the
changes from the target configuration are committed. It does not represent the actual running
configuration.
You can preview the combined configuration in global configuration and administration configuration
modes. You cannot preview the combined configuration in EXEC modes because the target configuration
must be committed or abandoned before returning to EXEC or administration EXEC mode.
To display the combined target and running configuration, enter the show configuration merge
command in any configuration mode.
3-58
NoteThe merge option does not appear in command help until the target configuration contains at least one
configuration change.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
The following example shows how to display the active SDR configuration (show running-config),
configure an interface, and display the merged configuration:
RP/0/0/CPU0:router# show running-config
Building configuration...
!! Last configuration change at 16:52:49 UTC Sun March 10 2004 by cisco
!
hostname router
shutdown
end
RP/0/RP0/CPU0:router(config)# show configuration merge
Building configuration...
!! Last configuration change at 16:52:49 UTC Sun March 10 2004 by cisco
!
hostname router
interface POS0/3/0/3
description faq
ipv4 address 10.1.1.1 255.0.0.0
shutdown
end
Managing Configuration Sessions
Displaying Configuration Error Messages and Descriptions
Configuration changes are automatically verified during the commit operation, and a message appears
if one or more configuration entry fails. To display an error message and description for a failed
configuration, enter the show configuration failed command.
NoteYou can view configuration errors only during the current configuration session. If you exit
configuration mode after the commit operation, the configuration error information is lost.
In the following example, an error is introduced in global configuration mode and the error information
appears after the commit operation fails:
RP/0/0/CPU0:router# configure
RP/0/0/CPU0:router(config)# taskgroup alr
RP/0/0/CPU0:router(config-tg)# description this is a test of an invalid taskgroup
RP/0/0/CPU0:router(config-tg)# commit
% Failed to commit one or more configuration items. Please use 'show configuration failed'
to view the errors
RP/0/0/CPU0:router(config-tg)# show configuration failed
!! CONFIGURATION FAILED DUE TO SEMANTIC ERRORS
taskgroup alr
!!% Usergroup/Taskgroup names cannot be taskid names
!
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-59
Chapter 3 Configuring General Router Features
Managing Configuration Sessions
Displaying Configuration Error Messages Without Descriptions
Configuration changes are automatically verified during the commit operation, and a message appears
if one or more configuration entry fails. To display only the error message (without a description) for a
failed configuration, enter the show configuration failed noerror command, as shown in the following
example:
RP/0/0/CPU0:router(config-tg)# show configuration failed noerror
!! CONFIGURATION FAILED DUE TO SEMANTIC ERRORS
taskgroup alr
!
NoteYou can view configuration errors only during the current configuration session. If you exit
configuration mode after the commit operation, the configuration error information is lost.
Displaying Configuration Error Messages Produced While Loading a Configuration
To display any syntax errors found in a configuration loaded with the load command, enter the show
configuration failed load command.
Saving the Target Configuration to a File
Target configurations can be saved to a separate file without committing them to the running
configuration. Target configuration files can then be loaded at a later time and further modified or
committed.
To save the configuration changes in the target configuration to a file, enter the save configuration device: command. Replace the device argument with the name of the device on which you want to store
the file (for example, disk0). After you enter this command, the router prompts you to enter a filename.
If you enter only a filename, the file is stored in the root directory of the device. To store the file in a
directory, enter the directory path and filename when prompted. We recommend that you specify the cfg
file extension for easy identification. This suffix is not required, but it can help locate target
configuration files, for example:
myconfig.cfg
The following example shows a target configuration file saved to the usr/cisco directory of disk0:
RP/0/0/CPU0:router(admin-config)# save configuration disk0:
Mon May 31 21:52:13.237 DST
Destination file name (control-c to abort): [/running-config]?/usr/cisco/test.cfg
Building configuration.
1 lines built in 1 second
[OK]
You can also save a configuration to a file using the show configuration | file filename command:
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
Loading the Target Configuration from a File
To populate the target configuration with the contents of a previously saved configuration file, go to
global configuration or administration configuration mode and enter the load filename command.
Consider the following when entering the filename argument:
• Specifies the configuration file to be loaded into the target configuration.
• If the full path of the file is not specified, the router attempts to load the file from the root directory
on the device.
The following example shows a target configuration file loaded into the current configuration session.
The current configuration session is populated with the contents of the file.
Loading an Alternative Configuration at System Startup
Managing Configuration Sessions
When a router is reset or powered on, the last running configuration is loaded and used to operate the
router.
You can load an alternative configuration during system boot. For information and instructions on this
process, see Cisco IOS XR ROM Monitor Guide for the Cisco XR 12000 Series Router.
Clearing All Changes to a Target Configuration
To clear changes made to the target configuration without terminating the configuration session, enter
the clear command in global configuration mode or administration configuration mode. This command
deletes any configuration changes that have not been committed.
In the following example, the user configures an interface but does not commit it. After reviewing the
changes to the target configuration with the show configuration command, the user decides to remove
the changes and start over by entering the clear command:
RP/0/0/CPU0:router# configure
RP/0/0/CPU0:router(config)# interface POS 0/3/0/1
RP/0/0/CPU0:router(config-if)# description this is my interface
RP/0/0/CPU0:router(config-if)# ipv4 address 10.1.1.1 255.0.0.0
RP/0/0/CPU0:router(config-if)# shutdown
RP/0/0/CPU0:router(config-if)# exit
RP/0/0/CPU0:router(config)# show configuration
Building configuration...
interface POS0/3/0/1
description this is my interface
ipv4 address 10.1.1.1 255.0.0.0
shutdown
end
OL-24755-01
RP/0/0/CPU0:router(config)# clear
RP/0/0/CPU0:router(config)# show configuration
Building configuration...
end
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-61
Managing Configuration Sessions
Committing Changes to the Running Configuration
The changes in the target configuration do not become part of the running configuration until you enter
the commit command. When you commit a target configuration, you can use the commit command to
do either of the following:
• Merge the target configuration with the running configuration to create a new running configuration.
• Replace the running configuration with the target configuration.
NoteIf you try to end a configuration session without saving your changes to the running configuration with
the commit command, you are prompted to save the changes. For more information, see the “Ending a
Configuration Session” section on page 3-65.
To commit target configuration changes to the running configuration, enter the commit command by
itself or with one or more of the options described in Table 3 -5.
Table 3-5Commit Command Options
Command Description
commit(Default) Merges the target configuration with the running configuration
and commits changes only if all changes in the target configuration pass
the semantic verification process. If any semantic errors are found, none
of the configuration changes takes effect.
commit best-effortMerges the target configuration with the running configuration and
commits only valid changes (best effort). Some configuration changes
might fail due to semantic errors.
commit comment line (Optional) Assigns a comment to a commit.
• This text comment appears in the commit entry displayed with the
show configuration commit list [detail] command.
Chapter 3 Configuring General Router Features
3-62
• The line argument is the text for the optional comment or label.
• The comment option must appear at the end of the command line. If
multiple options are entered, all text after the comment option is
treated as a comment.
commit confirmed
seconds
(Optional) Commits the configuration in global configuration mode on a
trial basis for a minimum of 30 seconds and a maximum of 300 seconds
(5 minutes).
• During the trial configuration, enter commit to confirm the
configuration. If you do not enter the commit command, the router
reverts to the previous configuration when the trial time period
expires.
• The confirmed option is not available in administration
configuration mode.
commit label line(Optional) Assigns a meaningful label. This label appears in the output
for the show configuration commit list [detail] command instead of the
numeric label.
• The line argument is the text for the optional comment or label.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
Table 3-5Commit Command Options (continued)
Command Description
commit force(Optional) Merges the target configuration with the running
commit replace(Optional) Replaces the contents of the running configuration with the
Managing Configuration Sessions
configuration and allows a configuration commit in low-memory
conditions.
A low-memory warning occurs when a user attempts to commit a target
configuration that exceeds the default capacity of the router.
The recommended resolution to such a warning is to remove
configurations using the no commands.
CautionThe force option can cause the router to experience severe
problems if low-memory conditions occur. The force option
should be used only to remove configurations.
target configuration.
Examples
The following examples illustrate how to commit a configuration:
• Committing a Configuration from Global Configuration Mode: Example, page 3-63
• Committing a Configuration from Administration Configuration Mode: Example, page 3-63
Committing a Configuration from Global Configuration Mode: Example
In the following example, the default commit command is entered in global configuration mode:
RP/0/0/0:Aug 6 09:26:17.781 : %LIBTARCFG-6-COMMIT Configuration committed by user
‘cisco'. Use 'show configuration commit changes 1000000124' to view the changes.
NoteThe preceding message is stored in the log and appears only if logging is configured to display on screen.
Committing a Configuration from Administration Configuration Mode: Example
In the following example, the commit command is entered with the label and comment keywords in
administration configuration mode:
RP/0/0/CPU0:router# admin
RP/0/0/CPU0:router(admin)# configure
RP/0/0/CPU0:router(admin-config)# sdr test
RP/0/0/CPU0:router(admin-config-sdr:test)# location 0/1/* primary
RP/0/0/CPU0:router(admin-config-sdr:test)# commit label test comment This is a test
RP/0/0/CPU0:router(admin-config)# show configuration commit list detail
OL-24755-01
1) CommitId: 2000000018 Label: test
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-63
Managing Configuration Sessions
UserId: user1 Line: vty1
Client: CLI Time: 23:45:40 UTC Tue Mar 07 2006
Comment: This is a test
.
.
.
NoteConfiguration files are stored on the same flash disk as the boot image. Access these configurations only
through the CLI commands for configuration management, history, and rollback. Direct modification or
deletion of these files can result in lost router configurations.
Reloading a Failed Configuration
If the router displays a configuration failure message when you attempt to commit a configuration
change, the configuration changes are not lost. While you remain in global configuration mode or
administration configuration mode, you can load the configuration changes into the target configuration,
correct the errors, and commit the changes.
To load a failed configuration, go to global configuration or administration configuration mode and enter
the load configuration failed commit command, as shown in the following example:
RP/0/0/CPU0:router(config)# load configuration failed commit
RP/0/0/CPU0:router(config)# show configuration
Chapter 3 Configuring General Router Features
Building configuration...
taskgroup alr
!
end
In the preceding example, the show configuration command displays the target configuration, which
includes the failed configuration.
NoteThe failed configuration is discarded if you exit global configuration mode or administration
configuration mode without recovering the configuration. After recovery, correct and commit the
configuration or save it to a file to avoid losing it.
Exiting a Configuration Submode
When you have finished configuration changes in a configuration submode, such as the interface or SDR
configuration submodes, you can return to the previous configuration mode and continue making
configuration changes. To exit a configuration submode, enter the exit command, as shown in the
following example:
RP/0/0/CPU0:router# configure
RP/0/0/CPU0:router(config)# interface POS 0/3/0/1
RP/0/0/CPU0:router(config-if)# description this is my interface
RP/0/0/CPU0:router(config-if)# ipv4 address 10.1.1.1 255.0.0.0
RP/0/0/CPU0:router(config-if)# exit
RP/0/0/CPU0:router(config)#
3-64
NoteIf you use the exit command to exit global configuration or administration configuration mode, the
router prompts you to save changes, discard changes, or cancel the action, as described in the next
section.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
Returning Directly to Configuration Mode from a Submode
When you have finished configuration changes in a configuration submode, such as the interface or SDR
configuration submodes, you can skip all intermediate submodes and return to the top-level
configuration mode and continue making configuration changes. To return to configuration mode, enter
the root command, as shown in the following example:
You can use any of the following methods to end a configuration session:
• Enter the exit command in global configuration or administration configuration mode
• Enter the end command in any configuration mode or submode
• Press Ctrl-Z
Managing Configuration Sessions
NoteIf you enter the exit command in a configuration submode, the command returns you to the parent
configuration level.
If you end a configuration session without committing the configuration changes, the router prompts you
to save changes, discard changes, or cancel the action, as shown in the following example:
RP/0/0/CPU0:router(config-if)# end
Uncommitted changes found, commit them before exiting(yes/no/cancel)? [cancel]:
Respond to the prompt by entering one of the following options:
• yes—Commit the configuration changes and exit configuration mode
• no—Exit configuration mode without committing the configuration changes
• cancel—Remain in configuration mode without committing the configuration changes
NoteIn EXEC mode, the exit command logs the user out of the system.
Aborting a Configuration Session
When you abort a configuration session, any changes are discarded and the configuration session ends.
No warning is given before the configuration changes are deleted.
The abort command in global configuration mode, discards configuration changes and returns to EXEC
mode. In administration configuration mode, the abort command discards configuration changes and
returns to administration EXEC mode. To abort a configuration session, enter the abort command, as
shown in the following example:
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-65
Configuring the SDR Hostname
RP/0/0/CPU0:router(config-if)# description this is my interface
RP/0/0/CPU0:router(config-if)# ipv4 address 10.1.1.1 255.0.0.0
RP/0/0/CPU0:router(config-if)# shutdown
RP/0/0/CPU0:router(config-if)# abort
RP/0/0/CPU0:router#
Configuring the SDR Hostname
The hostname identifies an SDR on the network. Although devices can be uniquely identified by their
Layer 2 and Layer 3 addresses (such as an IP address), it is often simpler to remember network devices
by an alphanumeric “hostname.” This name is used in the CLI prompt and default configuration
filenames and to identify the SDR on the network.
To configure the hostname, enter the hostname command with the SDR name as shown in the following
example:
RP/0/0/CPU0:Apr 7 00:07:33.246 : config[65669]: %LIBTARCFG-6-COMMIT : Configuration
committed by user 'user_a'. Use 'show configuration commit changes 1000000067' to view
the changes.
RP/0/0/CPU0:SDR_SJ(config)#
Chapter 3 Configuring General Router Features
The preceding example sets the SDR name to SDR_SJ.
NoteNo blanks or spaces are permitted as part of a name. Do not expect case to be preserved. Uppercase and
lowercase characters look the same to many Internet software applications. It may seem appropriate to
capitalize a name the same way you might if you were writing, but conventions dictate that computer
names appear all lowercase. For more information, see RFC 1178, Choosing a Name for Your Computer.
Configuring the Management Ethernet Interface
The Management Ethernet interface on the RPs is used to connect the router to a network for remote
management using a Telnet client, the Simple Network Management Protocol (SNMP), or other
management agents. The following sections provide information on the Management Ethernet interface:
• Specifying the Management Ethernet Interface Name in CLI Commands, page 3-67
• Displaying the Available Management Ethernet Interfaces, page 3-67
• Configuring the Management Ethernet Interface, page 3-68
3-66
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
Displaying the Available Management Ethernet Interfaces
Specifying the Management Ethernet Interface Name in CLI Commands
Before you can configure the Management Ethernet interface, you must know the Management Ethernet
interface name, which is defined using the following syntax: typerack/slot/module/port. Table 3 -6
describes the Management Ethernet interface name syntax.
Table 3-6Management Ethernet Interface Name Syntax Description
Syntax ComponentDescription
typeInterface type for a Management Ethernet port is “MgmtEth.”
rackChassis number of the rack. In a single-shelf system, the rack is always
“0”.
slotPhysical slot of the RP or DRP on which the interface is located. For a
Cisco XR 12000 Series Router, the PRPs may be installed in slots 0
through 15, depending on the router model.
moduleOn an RP, the module is “CPU0”. DRPs have two processors, so the
module is either “CPU0” and “CPU1”.
portOn Cisco XR 12000 Series Routers, there are three Ethernet ports on
PRP-2 cards. The Ethernet ports are labeled ETH 0, ETH 1, and ETH 2.
For the ETH 0 port, specify 0; for the ETH 1 port, specify 1; and for the
ETH 2 port, specify 2.
Specify 0 for the MGMT ETH interface on an RP or DRP.
Tabl e 3-7 shows examples of Management Ethernet interface names for a single-shelf system.
Table 3-7Management Ethernet Interface Names for Single-Shelf Systems
Management Interface Interface NameExample
Cisco XR 12000 Series Router
PRP in slot 0, port ETH0
Cisco XR 12000 Series Router
PRP in slot 0, port ETH1
Cisco XR 12000 Series Router
PRP in slot 1, port ETH0
Cisco XR 12000 Series Router
PRP in slot 1, port ETH1
MgmtEth0/0/CPU0/0router(config)# interface
MgmtEth0/0/CPU0/0
MgmtEth0/0/CPU0/1router(config)# interface
MgmtEth0/0/CPU0/1
MgmtEth0/1/CPU0/0router(config)# interface
MgmtEth0/1/CPU0/0
MgmtEth0/1/CPU0/1router(config)# interface
MgmtEth0/1/CPU0/1
Displaying the Available Management Ethernet Interfaces
To display the router interfaces, enter the show interfaces brief command in EXEC mode:
RP/0/0/CPU0:router# show interfaces brief
Mon May 31 22:03:33.039 DST
OL-24755-01
Intf Intf LineP Encap MTU BW
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-67
Displaying the Available Management Ethernet Interfaces
Name State State Type (byte) (Kbps)
------------------------------------------------------------------------------- Lo0 up up Loopback 1500 0
Nu0 up up Null 1500 0
ti1019 up up TUNNEL_GRE 1500 100
ti10100 up up TUNNEL_GRE 1500 100
ti10200 up up TUNNEL_GRE 1500 100
tt100 down down TUNNEL 1500 0
tt1060 up up TUNNEL 1500 0
PO0/6/0/0 up up HDLC 4474 155520
PO0/6/0/1 up up HDLC 4474 155520
PO0/6/0/2 admin-down admin-down HDLC 4474 155520
PO0/6/0/3 up up HDLC 4474 155520
Te0/6/1/0 up up ARPA 1514 10000000
PO0/6/4/0 admin-down admin-down HDLC 4474 622080
PO0/6/4/1 admin-down admin-down HDLC 4474 622080
PO0/6/4/2 admin-down admin-down HDLC 4474 622080
PO0/6/4/3 admin-down admin-down HDLC 4474 622080
PO0/6/4/4 up up HDLC 4474 622080
PO0/6/4/5 up up HDLC 4474 622080
PO0/6/4/6 up up HDLC 4474 622080
PO0/6/4/7 admin-down admin-down HDLC 4474 622080
Gi0/6/5/0 admin-down admin-down ARPA 1514 1000000
Gi0/6/5/1 up up ARPA 2014 1000000
Gi0/6/5/2 up up ARPA 2014 1000000
Gi0/6/5/3 admin-down admin-down ARPA 1514 1000000
Gi0/6/5/4 up up ARPA 2014 1000000
Gi0/6/5/5 up up ARPA 2014 1000000
Gi0/6/5/6 up up ARPA 2014 1000000
Gi0/6/5/7 up up ARPA 2014 1000000
Mg0/RP0/CPU0/0 up up ARPA 1514 100000
Mg0/RP1/CPU0/0 up up ARPA 1514 100000
Chapter 3 Configuring General Router Features
Configuring the Management Ethernet Interface
To use the Management Ethernet interface for system management and remote communication, you must
configure an IP address and a subnet mask for the interface. To have the interface communicate with
devices on other networks (such as remote management stations or TFTP servers), you need to configure
a default route for the router.
TipFor information on additional configuration options for the Management Ethernet interface, see
Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco XR 12000 Series
Router.
Prerequisites
To configure the Ethernet Management port for network communications, you must enter the interface
network addresses and subnet mask. Consult your network administrator or system planner for this
information.
SUMMARY STEPS
1. configure
2. interface MgmtEth rack/slot/CPU0/port
3-68
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
Exits the Management Ethernet interface configuration
mode.
Configures a default route to use for communications with
devices on other networks.
• Replace default-gateway with the IP address of the
local gateway that can be used to reach other
networks.
• This default route applies to all interfaces. You might
need to configure additional static routes to support
your network. For more information on configuring
static routes, see Cisco IOS XR Routing
Configuration Guide for the Cisco XR 12000 Series
Router.
Commits the target configuration to the running
configuration.
3-70
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
Command or ActionPurpose
Step 8
end
Example:
RP/0/0/CPU0:router(config)# end
Step 9
show interfaces MgmtEthrack/slot/CPU0/port
Example:
RP/0/0/CPU0:router# show interfaces
MgmtEth0/RP0/CPU0/0
Displaying the Available Management Ethernet Interfaces
Saves configuration changes.
• When you issue the end command, the system
prompts you to commit changes:
Uncommitted changes found, commit them before
exiting(yes/no/cancel)?
[cancel]:
• Entering no exits the configuration session and
returns the router to EXEC mode without committing
the configuration changes.
• Entering cancel leaves the router in the current
configuration session without exiting or committing
the configuration changes.
Displays interface details to verify the settings.
Examples
The following example shows how the Management Ethernet interface on the RP in slot RP1 is
configured with an IP address.
RP/0/0/CPU0:router# configure
RP/0/0/CPU0:router(config)# interface MgmtEth0/0/CPU0/0
RP/0/0/CPU0:router(config-if)# ipv4 address 10.1.1.1 255.255.255.0
RP/0/0/CPU0:router(config-if)# no shutdown
RP/0/0/CPU0:router(config-if)# commit
RP/0/0/CPU0:router(config-if)# end
RP/0/0/CPU0:router#
RP/0/0/CPU0:router# show interfaces MgmtEth 0/0/CPU0/0
MgmtEth0/0/CPU0/0 is up, line protocol is up
Interface state transitions: 1
Hardware is Management Ethernet, address is 0011.93ef.e8e6 (bia 0011.93ef.e8e6)
Description: Connected to Lab LAN
Internet address is 172.29.52.70/24
MTU 1514 bytes, BW 100000 Kbit
reliability 255/255, txload 0/255, rxload 0/255
Encapsulation ARPA,
Half-duplex, 100Mb/s, 1000BASE-T, link type is autonegotiation
output flow control is off, input flow control is off
loopback not set,
ARP type ARPA, ARP timeout 04:00:00
Last input 00:00:00, output 00:00:00
Last clearing of "show interface" counters never
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
31371 packets input, 1922996 bytes, 153 total input drops
0 drops for unrecognized upper-level protocol
Received 19457 broadcast packets, 0 multicast packets
12 runts, 0 giants, 0 throttles, 0 parity
61 input errors, 27 CRC, 12 frame, 0 overrun, 0 ignored, 0 abort
12869 packets output, 878236 bytes, 0 total output drops
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
Additional information about configuring management
interfaces
Advanced Configuration and Modification of the
Management Ethernet Interface on Cisco IOS XR Software
module of Cisco IOS XR Interface and Hardware Component
Configuration Guide for the Cisco XR 12000 Series Router
Manually Setting the Router Clock
Generally, if the system is synchronized by a valid outside timing mechanism, such as a Network Time
Protocol (NTP) or VINES clock source, you do not need to set the software clock. Use the clock set
command for initial configuration or if a network time source is not available.
The clock timezone command should be entered before the clock is set because it defines the difference
between the system time and Coordinated Universal Time (UTC). When you set the time, you set the
system time, and the router uses the clock timezone command setting to translate that time to UTC. The
system internally keeps time in UTC. When you enter the show clock command, the router displays the
system time.
To manually set the router clock, follow these steps:
Chapter 3 Configuring General Router Features
SUMMARY STEPS
1. configure
2. clock timezone zone hours-offset
3. commit
4. end
5. clock set hh:mm:ss dd mm yyyy
6. clock update-calendar
7. show clock
3-72
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
DETAILED STEPS
Command or ActionPurpose
Step 1
configure
Example:
RP/0/0/CPU0:router# configure
Step 2
clock timezone zone hours-offset
Example:
RP/0/0/CPU0:router(config)# clock timezone pst
-8
Step 3
commit
Manually Setting the Router Clock
Enters global configuration mode.
Sets the time zone for the router clock.
• clock timezone command should be entered before
the clock is set because it defines the difference
between the system time and UTC.
NoteThe system time is the time that appears when you
enter the show clock command.
• zone—Name of the time zone to be displayed when
standard time is in effect.
• hours-offset—Difference in hours from UTC.
Commits the target configuration to the running
configuration.
Example:
RP/0/0/CPU0:router(config-if)# commit
Step 4
end
Example:
RP/0/0/CPU0:router(config-if)# end
Step 5
clock set hh:mm:ss dd mm yyyy
Example:
RP/0/0/CPU0:router# clock set 14:12:00 10 dec
2008
Step 6
clock update-calendar
Example:
RP/0/0/CPU0:router# clock update-calendar
Step 7
show clock
Example:
RP/0/0/CPU0:router# show clock
Examples
Ends the configuration session and returns to EXEC mode.
Sets the system software clock.
Updates the hardware clock (calendar clock) with the new
clock settings.
• It is battery operated and runs continuously, even if the
router is powered off or rebooted.
Displays the clock setting.
• Use this command to verify the settings.
OL-24755-01
The following example shows how the manual system clock is configured:
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-73
Chapter 3 Configuring General Router Features
Where to Go Next
RP/0/0/CPU0:router# clock set 14:12:00 10 dec 2008
14:12:00.090 PST Wed Dec 02 2008
RP/0/0/CPU0:router# clock update-calendar
RP/0/0/CPU0:router# show clock
14:12:00.090 PST Wed Dec 02 2008
Related Documents
Related TopicDocument Title
Descriptions of the clock commandsClock Commands on Cisco IOS XR Software module of Cisco IOS XR
System Management Command Reference for the Cisco XR 12000
Series Router
Commands used to configure NTPNTP Commands on Cisco IOS XR Software module of Cisco IOS XR
System Management Command Reference for the Cisco XR 12000
Series Router
Configuration of NTPImplementing NTP on Cisco IOS XR Software module of Cisco IOS XR
System Management Configuration Guide for the Cisco XR 12000 Series
Router
Where to Go Next
When you have completed the configuration procedures in this chapter, consider the following resources
for additional configuration documentation:
• For information on configuring additional general router features, see Configuring Additional
Router Features
• For information on using the Cisco IOS XR software more efficiently, see CLI Tips, Techniques,
and Shortcuts
• For information on configuring interfaces, see the hardware documents listed in the “Related
Documents” section on page x.
3-74
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Contents
CHAPTER
4
Configuring Additional Router Features
This chapter contains instructions and information for entering basic configurations using the
command-line interface (CLI).
• Configuring the Domain Name and Domain Name Server, page 4-75
• Configuring Telnet, HTTP, and XML Host Services, page 4-77
• Managing Configuration History and Rollback, page 4-81
• Configuring Logging and Logging Correlation, page 4-86
• Creating and Modifying User Accounts and User Groups, page 4-90
Configuring the Domain Name and Domain Name Server
Configure a domain name and Domain Name Server (DNS) for your router to contact other devices on
your network efficiently. Use the following guidelines:
• To define a default domain name that the Cisco IOS XR software uses to complete unqualified
hostnames (names without a dotted-decimal domain name), use the domain-name command in
global configuration mode.
• To specify the address of one or more name servers to use for name and address resolution, use the
domain name-server command in global configuration mode. If no name server address is
specified, the default name server is 255.255.255.255 so the DNS lookup can be broadcast to the
local network segment. If a DNS server is in the local network, it replies. If not, there might be a
server that knows how to forward the DNS request to the correct DNS server.
• Use the show hosts command in EXEC mode to display the default domain name, the style of name
lookup service, a list of name server hosts, and the cached list of hostnames and addresses.
To configure the DNS and DNS server, follow these steps:
SUMMARY STEPS
1. configure
2. domain name domain-name-of-organization
3. domain name-server ipv4-address
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-75
Configuring the Domain Name and Domain Name Server
4. end or commit
5. show hosts
DETAILED STEPS
Command or ActionPurpose
Step 1
configure
Example:
RP/0/0/CPU0:router# configure
Step 2
domain name domain-name-of-organization
Example:
RP/0/0/CPU0:router(config)# domain name
cisco.com
Step 3
domain name-server ipv4-address
Example:
RP/0/0/CPU0:router(config)# domain name-server
192.168.1.111
Step 4
end
or
commit
Example:
RP/0/0/CPU0:router(config)# end
or
RP/0/0/CPU0:router(config)# commit
Chapter 4 Configuring Additional Router Features
Enters global configuration mode.
Defines a default domain name used to complete
unqualified hostnames.
Specifies the address of a name server to use for name and
address resolution (hosts that supply name information).
NoteYou can enter up to six addresses, but only one for
each command.
Saves configuration changes.
• When you issue the end command, the system prompts
you to commit changes:
Uncommitted changes found, commit them before
exiting(yes/no/cancel)?
[cancel]:
–
Entering yes saves configuration changes to the
running configuration file, exits the configuration
session, and returns the router to EXEC mode.
Step 5
4-76
show hosts
Example:
RP/0/0/CPU0:router(config)# show hosts
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
–
Entering no exits the configuration session and
returns the router to EXEC mode without
committing the configuration changes.
–
Entering cancel leaves the router in the current
configuration session without exiting or
committing the configuration changes.
• Use the commit command to save the configuration
changes to the running configuration file and remain
within the configuration session.
Displays all configured name servers.
OL-24755-01
Chapter 4 Configuring Additional Router Features
Examples
The following example shows how the domain name and DNS are configured:
RP/0/0/CPU0:router# configure
RP/0/0/CPU0:router(config)# domain name cisco.com
RP/0/0/CPU0:router(config)# domain name-server 10.1.1.1
RP/0/0/CPU0:router(config)# commit
RP/0/0/CPU0:router(config)# end
RP/0/0/CPU0:router# show hosts
Default domain is cisco.com
Name/address lookup uses domain service
Name servers: 10.1.1.1
Related Documents
Related TopicDocument Title
Complete descriptions of the domain services
commands
Implementing Host Services and Applications on Cisco IOS XR
Software module in Cisco IOS XR IP Addresses and Services
Configuration Guide for the Cisco XR 12000 Series Router
Configuring Telnet, HTTP, and XML Host Services
Configuring Telnet, HTTP, and XML Host Services
For security reasons, some host services are disabled by default. You can enable Host services, such as
Telnet, XML, and HTTP by using the commands described in this section. Host services provide the
following features:
• Enabling the Telnet server allows users to log in to the router using IPv4 or IPv6 Telnet clients.
• Enabling the XML agent enables XML Common Object Request Broker Architecture (CORBA)
agent services so that you can manage and configure the router using an XML interface.
Prerequisites
Ensure the following prerequisites are met before configuring Telnet, HTTP, and XML host services:
• For the XML and HTTP host services, the Manageability package must be installed and activated
on the router.
• To enable the Secure Socket Layer (SSL) of the HTTP and XML services, the security package must
be installed and activated on the router.
See Cisco IOS XR System Management Configuration Guide for the Cisco XR 12000 Series Router for
information on installing and activating packages.
NoteThis process enables the Telnet, HTTP, and XML host services on the Management Ethernet interfaces.
For more information on how to enable these services on other inband interfaces, see Implementing
Management Plane Protection in Cisco IOS XR Software module in Cisco IOS XR System Security
Configuration Guide for the Cisco XR 12000 Series Router.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 4 Configuring Additional Router Features
Managing Configuration History and Rollback
Related Documents
Related TopicDocument Title
Installation and activation of the Manageability and Security
Packages
Upgrading and Managing Cisco IOS XR Software module of
Cisco IOS XR System Management Configuration Guide for
the Cisco XR 12000 Series Router
Descriptions of the HTTP and XML server commandsManageability Commands on Cisco IOS XR Software module
of Cisco IOS XR System Management Command Reference
for the Cisco XR 12000 Series Router
Descriptions of the Telnet commandsHost Services and Applications Commands on Cisco IOS XR
Software module of Cisco IOS XR IP Addresses and Services
Command Reference for the Cisco XR 12000 Series Router
Managing Configuration History and Rollback
After each commit operation, the system saves a record of the committed configuration changes. This
record contains only the changes made during the configuration session; it does not contain the complete
configuration. Each record is assigned a unique ID, known as a commit ID.
When multiple commit IDs are present, you can use a commit ID to identify a previous configuration to
which to return, or you can use the commit ID to load the configuration changes made during that
configuration session. You can also load configuration changes from multiple commit IDs, and you can
clear commit IDs. If you are thinking about rolling back the configuration to a specific commit ID,
consider the following guidelines:
• You cannot roll back to a configuration that was removed because of package incompatibility.
Configuration rollbacks can succeed only when the configuration passes all compatibility checks
with the currently active Cisco IOS XR Software release.
• If the system finds an incompatible configuration during rollback, the operation fails and an error
appears.
The Cisco IOS XR software automatically saves up to 100 of the most recent commit IDs. The following
sections describe how to manage configuration changes and roll back to a previously committed
configuration:
• Displaying the Commit IDs, page 4-82
• Displaying the Configuration Changes Recorded in a Commit ID, page 4-82
• Rolling Back the Configuration to a Specific Rollback Point, page 4-83
• Rolling Back the Configuration over a Specified Number of Commits, page 4-84
• Loading Commit ID Configuration Changes to the Target Configuration, page 4-84
• Loading Rollback Configuration Changes to the Target Configuration, page 4-85
OL-24755-01
• Deleting Commit IDs, page 4-86
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-81
Managing Configuration History and Rollback
Displaying the Commit IDs
To display a history of up to 100 of the most recent commit IDs, enter the show configuration commit
list command in EXEC or administration EXEC mode. Up to 100 of the most recent commit IDs are
saved by the system. Each commit ID entry shows the user who committed configuration changes, the
connection used to execute the commit, and commit ID time stamp.
The commit IDs are shown in the “Label/ID” column. The following example shows the
show configuration commit list command display in EXEC and administration EXEC modes:
RP/0/0/CPU0:router# show configuration commit list
SNo. Label/ID User Line Client Time Stamp
~~~~ ~~~~~~~~ ~~~~ ~~~~ ~~~~~~ ~~~~~~~~~~
1 1000000219 cisco vty0 CLI 12:27:50 UTC Wed Mar 22 2006
2 1000000218 cisco vty1 CLI 11:43:31 UTC Mon Mar 20 2006
3 1000000217 cisco con0_RP0_C CLI 17:44:29 UTC Wed Mar 15 2006
RP/0/0/CPU0:router# admin
RP/0/0/CPU0:router(admin)# show configuration commit list
SNo. Label/ID User Line Client Time Stamp
~~~~ ~~~~~~~~ ~~~~ ~~~~ ~~~~~~ ~~~~~~~~~~
1 2000000022 cisco vty1 CLI 15:03:59 UTC Fri Mar 17 2006
2 2000000021 cisco con0_RP0_C CLI 17:42:55 UTC Wed Mar 15 2006
3 2000000020 SYSTEM con0_RP0_C Setup Dial 17:07:39 UTC Wed Mar 15 2006
Chapter 4 Configuring Additional Router Features
Displaying the Configuration Changes Recorded in a Commit ID
To display the configuration changes made during a specific commit session (commit ID), go to EXEC
or administration EXEC mode and enter the show configuration commit changes command followed
by a commit ID number. The easiest way to determine the commit ID is to enter the show configuration commit changes ? command first. In the following example, the command help is used to display the
available commit IDs, and then the changes for a specific commit ID are displayed:
RP/0/0/CPU0:router(admin)# show configuration commit changes ?
last Changes made in the most recent <n> commits
since Changes made since (and including) a specific commit
2000000020 Commit ID
2000000021 Commit ID
2000000022 Commit ID
RP/0/0/CPU0:router(admin)# show configuration commit changes 2000000020
Building configuration...
username cisco
secret 5 $1$MgUH$xzUEW6jLfyAYLKJE.3p440
group root-system
!
end
4-82
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 4 Configuring Additional Router Features
Previewing Rollback Configuration Changes
The show configuration rollback changes command allows you to preview the configuration changes
that take place if you roll back the configuration to a specific commit ID. For example, if you want to
roll back the configuration to a specific point, all configuration changes made after that point must be
undone. This rollback process is often accomplished by executing the no version of commands that must
be undone.
To display the prospective rollback configuration changes from the current configuration to a specific
commit ID, go to EXEC or administration EXEC mode and enter the show configuration rollback changes to commit ID command. In the following example, the command help displays the available
commit IDs, and then the rollback changes are displayed:
RP/0/0/CPU0:router# show configuration rollback changes to ?
1000000217 Commit ID
1000000218 Commit ID
1000000219 Commit ID
RP/0/0/CPU0:router# show configuration rollback changes to 1000000218
Building configuration...
no interface Loopback100
interface POS0/1/0/0
no ipv6 nd dad attempts
!
!
no route-policy xx
end
Managing Configuration History and Rollback
To display the prospective rollback configuration changes from the current configuration to a specified
number of previous sessions, go to EXEC or administration EXEC mode and enter the show configuration rollback changes last commit-range command:
RP/0/0/CPU0:router# show configuration rollback changes last 2
Building configuration...
interface Loopback3
no description
no ipv4 address 10.0.1.1 255.0.0.0
exit
interface Loopback4
no description
no ipv4 address 10.0.0.1 255.0.0.0
end
In the preceding example, the command display shows the proposed rollback configuration changes for
the last two commit IDs.
Rolling Back the Configuration to a Specific Rollback Point
When you roll back the configuration to a specific rollback point, you undo all configuration changes
made during the session identified by the commit ID for that rollback point, and you undo all
configuration changes made after that point. The rollback process rolls back the configuration and
commits the rolled-back configuration. The rollback process also creates a new rollback point so that
you can roll back the configuration to the previous configuration.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-83
Chapter 4 Configuring Additional Router Features
Managing Configuration History and Rollback
TipTo preview the commands that undo the configuration during a rollback, use the show configuration
rollback changes command.
To roll back the router configuration to a previously committed configuration, go to EXEC or
administration EXEC mode and enter the rollback configuration to commit ID command:
RP/0/0/CPU0:router# rollback configuration to 1000000220
Loading Rollback Changes.
Loaded Rollback Changes in 1 sec
Committing.
2 items committed in 1 sec (1)items/sec
Updating.
Updated Commit database in 1 sec
Configuration successfully rolled back to '1000000220'.
Rolling Back the Configuration over a Specified Number of Commits
When you roll back the configuration over a specific number of commits, you do not have to enter a
specific commit ID. Instead, you specify a number x, and the software undoes all configuration changes
made in the last x committed configuration sessions. The rollback process rolls back the configuration,
commits the rolled-back configuration, and creates a new commit ID for the previous configuration.
TipTo preview the commands that undo the configuration during a rollback, use the show configuration
rollback changes command.
To roll back to the last x commits made, go to EXEC or administration EXEC mode and enter the
rollback configuration last x command; x is a number ranging from 1 to the number of saved commits
in the commit database.
In the following example, a request is made to roll back the configuration changes made during the
previous two commits:
RP/0/0/CPU0:router# rollback configuration last 2
Loading Rollback Changes.
Loaded Rollback Changes in 1 sec
Committing.
1 items committed in 1 sec (0)items/sec
Updating.
Updated Commit database in 1 sec
Configuration successfully rolled back 2 commits.
Loading Commit ID Configuration Changes to the Target Configuration
If the changes saved for a specific commit ID are close to what you want, but a rollback is not
appropriate, you can load the configuration changes for a commit ID into the target configuration,
modify the target configuration, and then commit the new configuration. Unlike the rollback process, the
loaded changes are not applied until you commit them.
4-84
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 4 Configuring Additional Router Features
NoteUnlike the rollback process, loading the commit ID configuration changes loads only the changes made
during that commit operation. The load process does not load all changes made between the commit ID
and the current committed configuration.
To load commit ID changes in the target configuration, go to global configuration or administration
configuration mode and enter the load commit changes command with the commit ID number. In the
following example, show commands are used to display the changes for a commit ID, the commit ID
configuration is loaded into the target configuration, and the target configuration is displayed:
RP/0/0/CPU0:router# show configuration commit changes ?
last Changes made in the most recent <n> commits
since Changes made since (and including) a specific commit
1000000217 Commit ID
1000000218 Commit ID
1000000219 Commit ID
1000000220 Commit ID
1000000221 Commit ID
RP/0/0/CPU0:router# show configuration commit changes 1000000219
Building configuration...
interface Loopback100
!
interface POS0/1/0/0
ipv6 nd dad attempts 50
!
end
Managing Configuration History and Rollback
RP/0/0/CPU0:router# config
RP/0/0/CPU0:router(config)# load commit changes 1000000219
Building configuration...
Loading.
77 bytes parsed in 1 sec (76)bytes/sec
RP/0/0/CPU0:router(config)# show configuration
Building configuration...
interface Loopback100
!
interface POS0/1/0/0
ipv6 nd dad attempts 50
!
end
Loading Rollback Configuration Changes to the Target Configuration
If the changes for a specific rollback point are close to what you want, but a rollback is not appropriate,
you can load the rollback configuration changes into the target configuration, modify the target
configuration, and then commit the new configuration. Unlike the rollback process, the loaded changes
are not applied until you commit them.
TipTo display the rollback changes, enter the show configurationrollback changes command.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-85
Configuring Logging and Logging Correlation
To load rollback configuration changes from the current configuration to a specific session, go to global
configuration or administration configuration mode and enter the load rollback changes to commit ID
command:
RP/0/0/CPU0:router(config)# load rollback changes to 1000000068
Building configuration...
Loading.
233 bytes parsed in 1 sec (231)bytes/sec
To load rollback configuration changes from the current configuration to a specified number of previous
sessions, go to global configuration or administration configuration mode and enter the load rollback changes last commit-range command:
RP/0/0/CPU0:router(config)# load rollback changes last 6
Building configuration...
Loading.
221 bytes parsed in 1 sec (220)bytes/sec
In the preceding example, the command loads the rollback configuration changes for the last six commit
IDs.
To load the rollback configuration for a specific commit ID, go to global configuration or administration
configuration mode and enter the load rollback changes commit ID command:
Building configuration...
Loading.
199 bytes parsed in 1 sec (198)bytes/sec
Deleting Commit IDs
You can delete the oldest configuration commit IDs by entering the clear configuration commits
command in EXEC or administration EXEC mode. The clear configuration commits command must
be followed by either the amount of disk space to reclaim or number of commit IDs to delete. To reclaim
disk space from the oldest commit IDs, enter the clear configuration commits command followed by
the diskspace keyword and number of kilobytes to reclaim:
Deleting 4 rollback points '1000000001' to '1000000004'
64 KB of disk space will be freed. Continue with deletion?[confirm]
To delete a specific number of the oldest commit IDs, enter the clear configuration commits command
followed by the oldest keyword and number of commit IDs to delete:
Deleting 5 rollback points '1000000005' to '1000000009'
80 KB of disk space will be freed. Continue with deletion?[confirm]
Configuring Logging and Logging Correlation
System messages generated by the Cisco IOS XR software can be logged to a variety of locations based
on the severity level of the messages. For example, you could direct information messages to the system
console and also log debugging messages to a network server.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-86
OL-24755-01
Chapter 4 Configuring Additional Router Features
In addition, you can define correlation rules that group and summarize related events, generate complex
queries for the list of logged events, and retrieve logging events through an XML interface.
The following sections describe logging and the basic commands used to log messages in
Cisco IOS XR software:
• Logging Locations and Severity Levels, page 4-87
• Alarm Logging Correlation, page 4-87
• Configuring Basic Message Logging, page 4-88
• Disabling Console Logging, page 4-90
Logging Locations and Severity Levels
Tabl e 4-1 shows error messages that can be logged to a variety of locations.
Table 4-1Logging Locations for System Error Messages
Tabl e 4-2 shows how you can log messages based on the severity level of the messages.
Table 4-2Logging Severity Levels for System Error Messages
LevelDescription
Level 0—Emergencies System has become unusable.
Level 1—AlertsImmediate action needed to restore system stability.
Level 2—CriticalCritical conditions that may require attention.
Level 3—ErrorsError conditions that may help track problems.
Level 4—WarningsWarning conditions that are not severe.
Level 5—NotificationsNormal but significant conditions that bear notification.
Level 6—InformationalInformational messages that do not require action.
Level 7—DebuggingDebugging messages are for system troubleshooting only.
Alarm Logging Correlation
Alarm logging correlation is used to group and filter similar messages to reduce the amount of redundant
logs and isolate the root causes of the messages.
For example, the original message describing the online insertion and removal (OIR) and system state
being up or down can be reported, and all subsequent messages reiterating the same event can be
correlated. When you create correlation rules, a common root event that is generating larger volumes of
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-87
Configuring Logging and Logging Correlation
follow-on error messages can be isolated and sent to the correlation buffer. An operator can extract all
correlated messages for display later, should the need arise. For more information, see Cisco IOS XR System Management Configuration Guide for the Cisco XR 12000 Series Router.
Configuring Basic Message Logging
Numerous options for logging system messages in Cisco IOS XR software are available. This section
provides a basic example.
To configure basic message logging, follow these steps: